Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1524386
MD5:9c54dc2f18fc09f760ab7267a4548200
SHA1:a9a5955aaa3d54664d49e33b1ef3d5a1972d2e0c
SHA256:6c70fcc3b15118416a0308d70360ffd66e5b08d569340ea0405578035a79d099
Tags:exeuser-Bitsight
Infos:

Detection

Credential Flusher
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Credential Flusher
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of debugger detection
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • file.exe (PID: 7260 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 9C54DC2F18FC09F760AB7267A4548200)
    • taskkill.exe (PID: 7276 cmdline: taskkill /F /IM chrome.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • chrome.exe (PID: 7388 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7656 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2540 --field-trial-handle=2040,i,10395247383509564896,14380982940132082764,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 5532 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5532 --field-trial-handle=2040,i,10395247383509564896,14380982940132082764,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 3560 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 --field-trial-handle=2040,i,10395247383509564896,14380982940132082764,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: file.exe PID: 7260JoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: file.exeReversingLabs: Detection: 15%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: file.exeJoe Sandbox ML: detected
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49752 version: TLS 1.0
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49719 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49724 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.5:49743 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.5:49763 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_007FDBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007CC2A2 FindFirstFileExW,0_2_007CC2A2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008068EE FindFirstFileW,FindClose,0_2_008068EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0080698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007FD076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007FD3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00809642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00809642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0080979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00809B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00809B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00805C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00805C97
    Source: global trafficTCP traffic: 192.168.2.5:49713 -> 1.1.1.1:53
    Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
    Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
    Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
    Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49752 version: TLS 1.0
    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
    Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
    Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
    Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
    Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
    Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
    Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
    Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
    Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
    Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
    Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
    Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
    Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
    Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0080CE44
    Source: global trafficHTTP traffic detected: GET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1Host: youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1Host: www.youtube.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
    Source: global trafficHTTP traffic detected: GET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=444455916&timestamp=1727887015863 HTTP/1.1Host: accounts.youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-wow64: ?0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-Dest: iframeReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=aHerFlXCZkv5WmU&MD=KPHoKgds HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
    Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: NID=518=YwyE3uF8hFD0dX8-X0hCAKvfxdZzDD1p1lFqiWJ0jR9oI9lhIAZ5zHrbnvsnOdyukmck4Ki6PSUyqUvQdpH1qOp8W5aF_2Il_n_TQp4jiJkZPt8NVi7zWLcIfps0qHSSM8Y9abnWKUnKwUBdHrkPP0aPgrTjWdGO32CrqNkG5zAT35JI4rE
    Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=aHerFlXCZkv5WmU&MD=KPHoKgds HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
    Source: chromecache_156.6.drString found in binary or memory: _.fq(p)+"/familylink/privacy/notice/embedded?langCountry="+_.fq(p);break;case "PuZJUb":a+="https://www.youtube.com/t/terms?chromeless=1&hl="+_.fq(m);break;case "fxTQxb":a+="https://youtube.com/t/terms?gl="+_.fq(_.oq(c))+"&hl="+_.fq(d)+"&override_hl=1"+(f?"&linkless=1":"");break;case "prAmvd":a+="https://www.google.com/intl/"+_.fq(m)+"/chromebook/termsofservice.html?languageCode="+_.fq(d)+"&regionCode="+_.fq(c);break;case "NfnTze":a+="https://policies.google.com/privacy/google-partners"+(f?"/embedded": equals www.youtube.com (Youtube)
    Source: global trafficDNS traffic detected: DNS query: youtube.com
    Source: global trafficDNS traffic detected: DNS query: www.youtube.com
    Source: global trafficDNS traffic detected: DNS query: www.google.com
    Source: global trafficDNS traffic detected: DNS query: accounts.youtube.com
    Source: global trafficDNS traffic detected: DNS query: play.google.com
    Source: unknownHTTP traffic detected: POST /log?format=json&hasfast=true&authuser=0 HTTP/1.1Host: play.google.comConnection: keep-aliveContent-Length: 518sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"Content-Type: application/x-www-form-urlencoded;charset=UTF-8sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"X-Goog-AuthUser: 0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: */*Origin: https://accounts.google.comX-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: chromecache_156.6.drString found in binary or memory: https://accounts.google.com
    Source: chromecache_156.6.drString found in binary or memory: https://accounts.google.com/TOS?loc=
    Source: file.exe, 00000000.00000002.2100843156.00000000011F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwd
    Source: chromecache_161.6.drString found in binary or memory: https://apis.google.com/js/api.js
    Source: chromecache_156.6.drString found in binary or memory: https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage
    Source: chromecache_156.6.drString found in binary or memory: https://families.google.com/intl/
    Source: chromecache_161.6.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/drive_2020q4/v10/192px.svg
    Source: chromecache_161.6.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/gmail_2020q4/v10/web-48dp/logo_gmail_2020q4_color_2x_web_
    Source: chromecache_161.6.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/maps/v7/192px.svg
    Source: chromecache_156.6.drString found in binary or memory: https://g.co/recover
    Source: chromecache_156.6.drString found in binary or memory: https://play.google.com/log?format=json&hasfast=true
    Source: chromecache_156.6.drString found in binary or memory: https://play.google.com/work/enroll?identifier=
    Source: chromecache_156.6.drString found in binary or memory: https://play.google/intl/
    Source: chromecache_156.6.drString found in binary or memory: https://policies.google.com/privacy
    Source: chromecache_156.6.drString found in binary or memory: https://policies.google.com/privacy/additional
    Source: chromecache_156.6.drString found in binary or memory: https://policies.google.com/privacy/google-partners
    Source: chromecache_156.6.drString found in binary or memory: https://policies.google.com/technologies/cookies
    Source: chromecache_156.6.drString found in binary or memory: https://policies.google.com/technologies/location-data
    Source: chromecache_156.6.drString found in binary or memory: https://policies.google.com/terms
    Source: chromecache_156.6.drString found in binary or memory: https://policies.google.com/terms/location
    Source: chromecache_156.6.drString found in binary or memory: https://policies.google.com/terms/service-specific
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-email-pin.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-password.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-or-voice-pin.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-pin.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-stop-go-landing-page_1x.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/animation/
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_device.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_pin.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_1x.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_2x.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_darkmode_1x.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/continue_on_your_phone.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_phone_number_verification.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_silent_tap_yes_darkmode.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes_darkmode.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_dark_v2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_v2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_not_ready.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_dark_1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_darkmode_1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_darkmode_1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_created.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_full_house.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_darkmode_1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_darkmode_1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_darkmode_1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_stop.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/personalization_reminders.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/phone_number_sign_in_2x.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_ios_center.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_laptop.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered_darkmode.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_phone.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_ios.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_pulldown.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_tapyes.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/smart_lock_2x.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/usb_key.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/web_and_app_activity.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/who_will_be_using_this_device.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/you_tube_history.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/gmail_ios_authzen.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/paaskey.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_light.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/screenlock.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_ipad.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_nfc.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_usb.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_phone.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_keys.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/loading_spinner_gm.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/progress_spinner_color_20dp_4x.gif
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/success-gm-default_2x.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/apps/signup/resources/custom-email-address.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/images/hpp/shield_security_checkup_green_2x_web_96dp.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_dark_1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_v1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_dark_v1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_v1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_dark_v1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_v1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_confirmation.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_0.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_dark_0.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_dark_2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_dark_2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_dark_2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_dark_2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_dark_3.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_dark_1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_dark_1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_dark_2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_dark_1.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_dark_2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_dark_v2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_v2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set_darkmode.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_v2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_dark_v2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_v2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space_dark.png
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2_dark.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess.svg
    Source: chromecache_161.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess_dark.svg
    Source: chromecache_156.6.drString found in binary or memory: https://support.google.com/accounts?hl=
    Source: chromecache_156.6.drString found in binary or memory: https://support.google.com/accounts?p=new-si-ui
    Source: chromecache_156.6.drString found in binary or memory: https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072
    Source: chromecache_161.6.drString found in binary or memory: https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
    Source: chromecache_156.6.drString found in binary or memory: https://www.google.com
    Source: chromecache_156.6.drString found in binary or memory: https://www.google.com/intl/
    Source: chromecache_161.6.drString found in binary or memory: https://www.gstatic.com/accounts/speedbump/authzen_optin_illustration.gif
    Source: chromecache_161.6.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/chrome_48dp.png
    Source: chromecache_161.6.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/googleg_48dp.png
    Source: chromecache_161.6.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/gsa_48dp.png
    Source: chromecache_161.6.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/play_prism_48dp.png
    Source: chromecache_161.6.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/youtube_48dp.png
    Source: chromecache_156.6.drString found in binary or memory: https://www.gstatic.com/images/branding/productlogos/googleg/v6/36px.svg
    Source: chromecache_156.6.drString found in binary or memory: https://www.youtube.com/t/terms?chromeless=1&hl=
    Source: file.exe, 00000000.00000003.2057329242.00000000009C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
    Source: chromecache_156.6.drString found in binary or memory: https://youtube.com/t/terms?gl=
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
    Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
    Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
    Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
    Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
    Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
    Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
    Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
    Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
    Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49719 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49724 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.5:49743 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.5:49763 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0080EAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0080ED6A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0080EAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_007FAA57
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00829576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00829576

    System Summary

    barindex
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
    Source: file.exe, 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_a4ab460c-1
    Source: file.exe, 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_e6d736a9-e
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_5be6682f-5
    Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_b28aa1e0-2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FD5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_007FD5EB
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_007F1201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_007FE8F6
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007980600_2_00798060
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008020460_2_00802046
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F82980_2_007F8298
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007CE4FF0_2_007CE4FF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007C676B0_2_007C676B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008248730_2_00824873
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0079CAF00_2_0079CAF0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007BCAA00_2_007BCAA0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007ACC390_2_007ACC39
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007C6DD90_2_007C6DD9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007AB1190_2_007AB119
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007991C00_2_007991C0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B13940_2_007B1394
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B17060_2_007B1706
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B781B0_2_007B781B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007A997D0_2_007A997D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007979200_2_00797920
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B19B00_2_007B19B0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B7A4A0_2_007B7A4A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B1C770_2_007B1C77
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B7CA70_2_007B7CA7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007C9EEE0_2_007C9EEE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0081BE440_2_0081BE44
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B1F320_2_007B1F32
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 007B0A30 appears 46 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 007AF9F2 appears 40 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 00799CB3 appears 31 times
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: classification engineClassification label: mal76.troj.evad.winEXE@39/38@12/9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008037B5 GetLastError,FormatMessageW,0_2_008037B5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F10BF AdjustTokenPrivileges,CloseHandle,0_2_007F10BF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_007F16C3
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008051CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_008051CD
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FD4DC CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_007FD4DC
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0080648E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007942A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_007942A2
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7284:120:WilError_03
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: file.exeReversingLabs: Detection: 15%
    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2540 --field-trial-handle=2040,i,10395247383509564896,14380982940132082764,262144 /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5532 --field-trial-handle=2040,i,10395247383509564896,14380982940132082764,262144 /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 --field-trial-handle=2040,i,10395247383509564896,14380982940132082764,262144 /prefetch:8
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobarsJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2540 --field-trial-handle=2040,i,10395247383509564896,14380982940132082764,262144 /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5532 --field-trial-handle=2040,i,10395247383509564896,14380982940132082764,262144 /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5532 --field-trial-handle=2040,i,10395247383509564896,14380982940132082764,262144 /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 --field-trial-handle=2040,i,10395247383509564896,14380982940132082764,262144 /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: Google Drive.lnk.4.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
    Source: YouTube.lnk.4.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
    Source: Sheets.lnk.4.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
    Source: Gmail.lnk.4.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
    Source: Slides.lnk.4.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
    Source: Docs.lnk.4.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007942DE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B0A76 push ecx; ret 0_2_007B0A89
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007AF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_007AF98E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00821C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00821C41
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-96727
    Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.8 %
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_007FDBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007CC2A2 FindFirstFileExW,0_2_007CC2A2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008068EE FindFirstFileW,FindClose,0_2_008068EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0080698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007FD076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007FD3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00809642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00809642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0080979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00809B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00809B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00805C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00805C97
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007942DE
    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

    Anti Debugging

    barindex
    Source: C:\Users\user\Desktop\file.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_0-96755
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0080EAA2 BlockInput,0_2_0080EAA2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007C2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007C2622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007942DE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B4CE8 mov eax, dword ptr fs:[00000030h]0_2_007B4CE8
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_007F0B62
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007C2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007C2622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007B083F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B09D5 SetUnhandledExceptionFilter,0_2_007B09D5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_007B0C21
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_007F1201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D2BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_007D2BA5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FB226 SendInput,keybd_event,0_2_007FB226
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008122DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_008122DA
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_007F0B62
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_007F1663
    Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
    Source: file.exeBinary or memory string: Shell_TrayWnd
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B0698 cpuid 0_2_007B0698
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00808195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00808195
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007ED27A GetUserNameW,0_2_007ED27A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007CB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_007CB952
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007942DE

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 7260, type: MEMORYSTR
    Source: file.exeBinary or memory string: WIN_81
    Source: file.exeBinary or memory string: WIN_XP
    Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
    Source: file.exeBinary or memory string: WIN_XPe
    Source: file.exeBinary or memory string: WIN_VISTA
    Source: file.exeBinary or memory string: WIN_7
    Source: file.exeBinary or memory string: WIN_8

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 7260, type: MEMORYSTR
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00811204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00811204
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00811806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00811806
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure2
    Valid Accounts
    1
    Windows Management Instrumentation
    1
    DLL Side-Loading
    1
    Exploitation for Privilege Escalation
    2
    Disable or Modify Tools
    21
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    2
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts1
    Native API
    2
    Valid Accounts
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol21
    Input Capture
    11
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAt1
    Registry Run Keys / Startup Folder
    2
    Valid Accounts
    2
    Obfuscated Files or Information
    Security Account Manager1
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
    Access Token Manipulation
    1
    DLL Side-Loading
    NTDS16
    System Information Discovery
    Distributed Component Object ModelInput Capture4
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
    Process Injection
    1
    Masquerading
    LSA Secrets22
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
    Registry Run Keys / Startup Folder
    2
    Valid Accounts
    Cached Domain Credentials2
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
    Virtualization/Sandbox Evasion
    DCSync3
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
    Access Token Manipulation
    Proc Filesystem1
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
    Process Injection
    /etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1524386 Sample: file.exe Startdate: 02/10/2024 Architecture: WINDOWS Score: 76 36 Multi AV Scanner detection for submitted file 2->36 38 Yara detected Credential Flusher 2->38 40 Binary is likely a compiled AutoIt script file 2->40 42 2 other signatures 2->42 7 file.exe 2->7         started        process3 signatures4 44 Binary is likely a compiled AutoIt script file 7->44 46 Found API chain indicative of debugger detection 7->46 48 Found API chain indicative of sandbox detection 7->48 10 chrome.exe 9 7->10         started        13 taskkill.exe 1 7->13         started        process5 dnsIp6 24 192.168.2.16 unknown unknown 10->24 26 192.168.2.5, 443, 49703, 49706 unknown unknown 10->26 28 239.255.255.250 unknown Reserved 10->28 15 chrome.exe 10->15         started        18 chrome.exe 10->18         started        20 chrome.exe 6 10->20         started        22 conhost.exe 13->22         started        process7 dnsIp8 30 youtube.com 142.250.184.238, 443, 49706 GOOGLEUS United States 15->30 32 www3.l.google.com 142.250.185.142, 443, 49736 GOOGLEUS United States 15->32 34 6 other IPs or domains 15->34

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    file.exe16%ReversingLabs
    file.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://play.google/intl/0%URL Reputationsafe
    https://families.google.com/intl/0%URL Reputationsafe
    https://policies.google.com/technologies/location-data0%URL Reputationsafe
    https://apis.google.com/js/api.js0%URL Reputationsafe
    https://policies.google.com/privacy/google-partners0%URL Reputationsafe
    https://policies.google.com/terms/service-specific0%URL Reputationsafe
    https://g.co/recover0%URL Reputationsafe
    https://policies.google.com/privacy/additional0%URL Reputationsafe
    https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=32850720%URL Reputationsafe
    https://policies.google.com/technologies/cookies0%URL Reputationsafe
    https://policies.google.com/terms0%URL Reputationsafe
    https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=0%URL Reputationsafe
    https://support.google.com/accounts?hl=0%URL Reputationsafe
    https://policies.google.com/terms/location0%URL Reputationsafe
    https://policies.google.com/privacy0%URL Reputationsafe
    https://support.google.com/accounts?p=new-si-ui0%URL Reputationsafe
    https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    youtube-ui.l.google.com
    216.58.212.174
    truefalse
      unknown
      www3.l.google.com
      142.250.185.142
      truefalse
        unknown
        play.google.com
        142.250.186.78
        truefalse
          unknown
          www.google.com
          142.250.185.68
          truefalse
            unknown
            youtube.com
            142.250.184.238
            truefalse
              unknown
              accounts.youtube.com
              unknown
              unknownfalse
                unknown
                www.youtube.com
                unknown
                unknownfalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://play.google.com/log?format=json&hasfast=true&authuser=0false
                    unknown
                    https://www.google.com/favicon.icofalse
                      unknown
                      https://play.google.com/log?hasfast=true&authuser=0&format=jsonfalse
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://play.google/intl/chromecache_156.6.drfalse
                        • URL Reputation: safe
                        unknown
                        https://families.google.com/intl/chromecache_156.6.drfalse
                        • URL Reputation: safe
                        unknown
                        https://youtube.com/t/terms?gl=chromecache_156.6.drfalse
                          unknown
                          https://policies.google.com/technologies/location-datachromecache_156.6.drfalse
                          • URL Reputation: safe
                          unknown
                          https://www.google.com/intl/chromecache_156.6.drfalse
                            unknown
                            https://apis.google.com/js/api.jschromecache_161.6.drfalse
                            • URL Reputation: safe
                            unknown
                            https://policies.google.com/privacy/google-partnerschromecache_156.6.drfalse
                            • URL Reputation: safe
                            unknown
                            https://play.google.com/work/enroll?identifier=chromecache_156.6.drfalse
                              unknown
                              https://policies.google.com/terms/service-specificchromecache_156.6.drfalse
                              • URL Reputation: safe
                              unknown
                              https://g.co/recoverchromecache_156.6.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/privacy/additionalchromecache_156.6.drfalse
                              • URL Reputation: safe
                              unknown
                              https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072chromecache_156.6.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/technologies/cookieschromecache_156.6.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/termschromecache_156.6.drfalse
                              • URL Reputation: safe
                              unknown
                              https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=chromecache_161.6.drfalse
                              • URL Reputation: safe
                              unknown
                              https://www.google.comchromecache_156.6.drfalse
                                unknown
                                https://play.google.com/log?format=json&hasfast=truechromecache_156.6.drfalse
                                  unknown
                                  https://www.youtube.com/t/terms?chromeless=1&hl=chromecache_156.6.drfalse
                                    unknown
                                    https://support.google.com/accounts?hl=chromecache_156.6.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://policies.google.com/terms/locationchromecache_156.6.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://policies.google.com/privacychromecache_156.6.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://support.google.com/accounts?p=new-si-uichromecache_156.6.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessagechromecache_156.6.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    142.250.186.78
                                    play.google.comUnited States
                                    15169GOOGLEUSfalse
                                    142.250.185.68
                                    www.google.comUnited States
                                    15169GOOGLEUSfalse
                                    216.58.206.78
                                    unknownUnited States
                                    15169GOOGLEUSfalse
                                    239.255.255.250
                                    unknownReserved
                                    unknownunknownfalse
                                    142.250.185.142
                                    www3.l.google.comUnited States
                                    15169GOOGLEUSfalse
                                    142.250.184.238
                                    youtube.comUnited States
                                    15169GOOGLEUSfalse
                                    216.58.212.174
                                    youtube-ui.l.google.comUnited States
                                    15169GOOGLEUSfalse
                                    IP
                                    192.168.2.16
                                    192.168.2.5
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1524386
                                    Start date and time:2024-10-02 18:35:52 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 4m 45s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:12
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:file.exe
                                    Detection:MAL
                                    Classification:mal76.troj.evad.winEXE@39/38@12/9
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 95%
                                    • Number of executed functions: 39
                                    • Number of non-executed functions: 314
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 142.250.186.35, 142.250.185.174, 64.233.184.84, 34.104.35.123, 142.250.184.202, 142.250.185.138, 142.250.185.202, 172.217.18.106, 142.250.185.170, 216.58.212.170, 142.250.185.74, 216.58.212.138, 142.250.186.170, 142.250.74.202, 142.250.185.234, 142.250.184.234, 142.250.186.42, 142.250.185.106, 142.250.181.234, 216.58.206.42, 172.217.18.99, 142.250.186.106, 172.217.18.10, 142.250.186.74, 142.250.186.138, 216.58.206.74, 172.217.16.202, 199.232.210.172, 192.229.221.95, 93.184.221.240, 142.250.186.99, 64.233.166.84, 142.250.186.142
                                    • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, content-autofill.googleapis.com, slscr.update.microsoft.com, fonts.gstatic.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, ocsp.digicert.com, update.googleapis.com, clients.l.google.com, www.gstatic.com, optimizationguide-pa.googleapis.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                    • VT rate limit hit for: file.exe
                                    No simulations
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    239.255.255.250file.exeGet hashmaliciousCredential FlusherBrowse
                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                        27987136e29b3032ad40982c8b7c2e168112c9601e08da806119dcba615524b5.htmlGet hashmaliciousUnknownBrowse
                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                    https://tqaun.us12.list-manage.com/track/click?u=fb0a5f04fa3c936488ff652c3&id=d22699c399&e=ce0a629e2eGet hashmaliciousHTMLPhisherBrowse
                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                        No context
                                                        No context
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        1138de370e523e824bbca92d049a3777file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 23.1.237.91
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 23.1.237.91
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 23.1.237.91
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 23.1.237.91
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 23.1.237.91
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 23.1.237.91
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 23.1.237.91
                                                        test.exeGet hashmaliciousBabadedaBrowse
                                                        • 23.1.237.91
                                                        exit.exeGet hashmaliciousBabadedaBrowse
                                                        • 23.1.237.91
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 23.1.237.91
                                                        28a2c9bd18a11de089ef85a160da29e4file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 184.28.90.27
                                                        • 20.114.59.183
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 184.28.90.27
                                                        • 20.114.59.183
                                                        27987136e29b3032ad40982c8b7c2e168112c9601e08da806119dcba615524b5.htmlGet hashmaliciousUnknownBrowse
                                                        • 184.28.90.27
                                                        • 20.114.59.183
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 184.28.90.27
                                                        • 20.114.59.183
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 184.28.90.27
                                                        • 20.114.59.183
                                                        New_Statement-8723107.jsGet hashmaliciousUnknownBrowse
                                                        • 184.28.90.27
                                                        • 20.114.59.183
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 184.28.90.27
                                                        • 20.114.59.183
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 184.28.90.27
                                                        • 20.114.59.183
                                                        New_Statement-8723107.jsGet hashmaliciousUnknownBrowse
                                                        • 184.28.90.27
                                                        • 20.114.59.183
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 184.28.90.27
                                                        • 20.114.59.183
                                                        No context
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 15:36:48 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                        Category:dropped
                                                        Size (bytes):2677
                                                        Entropy (8bit):3.987757812311024
                                                        Encrypted:false
                                                        SSDEEP:48:8w+daST6eFtHTeidAKZdA19ehwiZUklqehJy+3:8wwHSCy
                                                        MD5:2F3318322771FC6D923CF24E6A3F9E23
                                                        SHA1:337C9FCDEE2093E3DD0E7763976480D8EA910EDC
                                                        SHA-256:23C7B042CE8709320E3BBC7EABAE52A5A396D181EE52670B2B4472D3E4E0FA61
                                                        SHA-512:F3C8B304507ADE2B2D1857A12C25FCB062D48637CE68D4C5BD58701C4C2EB974D0BA97E94ABA6388B9143AF600A26FD6BDCE98D966503A7FB6638D8FD783A721
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:L..................F.@.. ...$+.,....>..F....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IBY......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VBY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VBY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VBY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VBY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........|.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 15:36:48 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                        Category:dropped
                                                        Size (bytes):2679
                                                        Entropy (8bit):4.0036940557460365
                                                        Encrypted:false
                                                        SSDEEP:48:8MdaST6eFtHTeidAKZdA1weh/iZUkAQkqehyy+2:8mHI9Qjy
                                                        MD5:C94F466C0C11DA5B30F31617719F5E93
                                                        SHA1:0D93A7D8A41765E7882D0130AD02E0D1AB0482E1
                                                        SHA-256:77D70E58049B36F6ADA8EA9DB80A18000D82250D3A0DDCC3DDD5056047D722EC
                                                        SHA-512:206AC71735FEC50767C7075ED67EC62DEBEB48BB706315F0F32839147613B88DE1C9ACD239DD1CC597432A573F303FEE0508E48EE749B0BB599CE2583D0120DF
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:L..................F.@.. ...$+.,....}1.F....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IBY......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VBY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VBY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VBY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VBY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........|.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                        Category:dropped
                                                        Size (bytes):2693
                                                        Entropy (8bit):4.013328672320401
                                                        Encrypted:false
                                                        SSDEEP:48:8x+daST6eFsHTeidAKZdA14tseh7sFiZUkmgqeh7sky+BX:8xwHznmy
                                                        MD5:6B170B674806EDF3B3E4902C5AAF4C2A
                                                        SHA1:C796D9670C242868C4D7CABAE94EF3F1D9AAA53C
                                                        SHA-256:C1F8C2E55418A801566AFEB9B10D6D7AD0DECAE16BF12F0602A0C89F8EFFCC4A
                                                        SHA-512:03F3BE03BB414AA658687733D30BD19B3AEDC136A9232F17560CE590A1ACB42DB3BA58515B91F7D889DAD687F90AB23FE66A4F07E44758FE211A69FB5DF52940
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IBY......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VBY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VBY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VBY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........|.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 15:36:48 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                        Category:dropped
                                                        Size (bytes):2681
                                                        Entropy (8bit):4.00358920563497
                                                        Encrypted:false
                                                        SSDEEP:48:8IdaST6eFtHTeidAKZdA1vehDiZUkwqeh+y+R:8CHT8y
                                                        MD5:2CEC1B22F0B71FD87E9C2A9DED02E635
                                                        SHA1:0696DA326320514555B39BBDBD201543CD5307C6
                                                        SHA-256:73B7DC0DFDE7B2E45D0B7E75B5770405E0DAC887802528E91766915DDF9AB27C
                                                        SHA-512:6F3E478FC43CDC1139BFA51567AB5ACDAF0866CEB41BB24E2A7A9730BBF9A326702894462BEB4F619E1B95D346F024F6FA1182E895CEBB706BB20F506334EC40
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:L..................F.@.. ...$+.,....u..F....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IBY......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VBY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VBY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VBY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VBY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........|.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 15:36:48 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                        Category:dropped
                                                        Size (bytes):2681
                                                        Entropy (8bit):3.990239970103386
                                                        Encrypted:false
                                                        SSDEEP:48:8MdaST6eFtHTeidAKZdA1hehBiZUk1W1qeh4y+C:8mHD9Yy
                                                        MD5:CAC36EF2D8C984834527F62E6CDF755C
                                                        SHA1:E962B3751F77395CF548C667D5F8AADD80ED5EF7
                                                        SHA-256:EA926FDE18CC6955840DC67DBC1DE7F9499045D3B472DE83A98C6C3F7BB947CB
                                                        SHA-512:7EF1A8EA76A8B8D2AD9FA55D16508363F22833176A0BF9D2965E875A31617B4010E825A01E4D2550484F04A789569622AB66EAD2C5D5B2039AABCD986FEF01C3
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:L..................F.@.. ...$+.,....yX.F....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IBY......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VBY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VBY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VBY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VBY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........|.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 2 15:36:48 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                        Category:dropped
                                                        Size (bytes):2683
                                                        Entropy (8bit):4.001102094929591
                                                        Encrypted:false
                                                        SSDEEP:48:8KdaST6eFtHTeidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbmy+yT+:8cHzT/TbxWOvTbmy7T
                                                        MD5:4F4DD3E0788E8A27BF661567A3F49999
                                                        SHA1:BFA1981263BF96E2BF44099BD3423ACD0DED43C2
                                                        SHA-256:BDD70F8BE0056C1CFC637507E5B7986DE338782449530BE9C9B4789503EB8D3B
                                                        SHA-512:8EE5AB4F5BEA678B57A7E825539403A312384D06280D4F3C7EEE10739A9F803E5E16FFF77772F97F48289A702318C18FD6BEA40CD4A4EB8ADF42C6B1542B93F4
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:L..................F.@.. ...$+.,.......F....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IBY......B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VBY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VBY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VBY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VBY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........|.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (468)
                                                        Category:downloaded
                                                        Size (bytes):1858
                                                        Entropy (8bit):5.298162049824456
                                                        Encrypted:false
                                                        SSDEEP:48:o7vGoolL3ALFKphnpiu7xOKAcfO/3d/rYh4vZorw:o/QLUFUL4KA+2y0Mw
                                                        MD5:CE055F881BDAB4EF6C1C8AA4B3890348
                                                        SHA1:2671741A70E9F5B608F690AAEEA4972003747654
                                                        SHA-256:9B91C23691D6032CDFE28863E369624B2EDB033E1487A1D1BB0977E3590E5462
                                                        SHA-512:8A22250628985C2E570E6FBADFC0D5CB6753F0735130F9E74962A409476C2859C5C81F8A0F5C427A9F13ED399C8E251FA43FF67AD5F16860640D45E7A538E857
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=iAskyc,ziXSP"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("iAskyc");._.QZ=function(a){_.W.call(this,a.Fa);this.window=a.Ea.window.get();this.Nc=a.Ea.Nc};_.J(_.QZ,_.W);_.QZ.Ba=function(){return{Ea:{window:_.qu,Nc:_.DE}}};_.QZ.prototype.Po=function(){};_.QZ.prototype.addEncryptionRecoveryMethod=function(){};_.RZ=function(a){return(a==null?void 0:a.Jo)||function(){}};_.SZ=function(a){return(a==null?void 0:a.m3)||function(){}};_.GPb=function(a){return(a==null?void 0:a.Op)||function(){}};._.HPb=function(a){return new Map(Array.from(a,function(b){var c=_.n(b);b=c.next().value;c=c.next().value;return[b,c.map(function(d){return{epoch:d.epoch,key:new Uint8Array(d.key)}})]}))};_.IPb=function(a){setTimeout(function(){throw a;},0)};_.QZ.prototype.kO=function(){return!0};_.nu(_.An,_.QZ);._.l();._.k("ziXSP");.var j_=function(a){_.QZ.call(this,a.Fa)};_.J(j_,_.QZ);j_.Ba=_.QZ.Ba;j_.prototype.Po=function(a,b,c){var d;if((d=this.window.chrome)==nu
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (683)
                                                        Category:downloaded
                                                        Size (bytes):3131
                                                        Entropy (8bit):5.355381206612617
                                                        Encrypted:false
                                                        SSDEEP:48:o7FEEM3MtH15jNQ8jsK3rnw0dkckTrKEp/OqLE9xz0W5Bzv3M6hIHYA+JITbwrF8:oq675jOArwoAmI/DLaxNPL5m+m6w
                                                        MD5:E2A7251AD83A0D0634FEA2703D10ED07
                                                        SHA1:90D72011F31FC40D3DA3748F2817F90A29EB5C01
                                                        SHA-256:1079B49C4AAF5C10E4F2E6A086623F40D200A71FF2A1F64E88AA6C91E4BE7A6F
                                                        SHA-512:CD6D75580EA8BD97CF7C7C0E0BD9D9A54FB6EA7DF1DDB5A95E94D38B260F9EE1425C640839ECD229B8D01E145CF2786CA374D31EC537EB8FE17FF415D5B985F5
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ZwDk9d,RMhBfe"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("ZwDk9d");.var gA=function(a){_.W.call(this,a.Fa)};_.J(gA,_.W);gA.Ba=_.W.Ba;gA.prototype.eS=function(a){return _.Xe(this,{Xa:{gT:_.ll}}).then(function(b){var c=window._wjdd,d=window._wjdc;return!c&&d?new _.li(function(e){window._wjdc=function(f){d(f);e(ZJa(f,b,a))}}):ZJa(c,b,a)})};var ZJa=function(a,b,c){return(a=a&&a[c])?a:b.Xa.gT.eS(c)};.gA.prototype.aa=function(a,b){var c=_.Zra(b).Rj;if(c.startsWith("$")){var d=_.gm.get(a);_.uq[b]&&(d||(d={},_.gm.set(a,d)),d[c]=_.uq[b],delete _.uq[b],_.vq--);if(d)if(a=d[c])b=_.af(a);else throw Error("Jb`"+b);else b=null}else b=null;return b};_.nu(_.Lfa,gA);._.l();._.k("SNUn3");._.YJa=new _.pf(_.wg);._.l();._.k("RMhBfe");.var $Ja=function(a){var b=_.tq(a);return b?new _.li(function(c,d){var e=function(){b=_.tq(a);var f=_.Sfa(a,b);f?c(f.getAttribute("jsdata")):window.document.readyState=="complete"?(f=["Unable to find deferred jsdata wit
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                                        Category:downloaded
                                                        Size (bytes):5430
                                                        Entropy (8bit):3.6534652184263736
                                                        Encrypted:false
                                                        SSDEEP:48:wIJct3xIAxG/7nvWDtZcdYLtX7B6QXL3aqG8Q:wIJct+A47v+rcqlBPG9B
                                                        MD5:F3418A443E7D841097C714D69EC4BCB8
                                                        SHA1:49263695F6B0CDD72F45CF1B775E660FDC36C606
                                                        SHA-256:6DA5620880159634213E197FAFCA1DDE0272153BE3E4590818533FAB8D040770
                                                        SHA-512:82D017C4B7EC8E0C46E8B75DA0CA6A52FD8BCE7FCF4E556CBDF16B49FC81BE9953FE7E25A05F63ECD41C7272E8BB0A9FD9AEDF0AC06CB6032330B096B3702563
                                                        Malicious:false
                                                        URL:https://www.google.com/favicon.ico
                                                        Preview:............ .h...&... .... .........(....... ..... ............................................0...................................................................................................................................v.].X.:.X.:.r.Y........................................q.X.S.4.S.4.S.4.S.4.S.4.S.4...X....................0........q.W.S.4.X.:.................J...A...g.........................K.H.V.8..........................F..B.....................,.......................................B..............................................B..B..B..B..B...u..........................................B..B..B..B..B...{.................5.......k...........................................................7R..8F.................................................2........Vb..5C..;I..................R^.....................0................Xc..5C..5C..5C..5C..5C..5C..lv..........................................]i..<J..:G..Zf....................................................
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (5693)
                                                        Category:downloaded
                                                        Size (bytes):578231
                                                        Entropy (8bit):5.598634168892362
                                                        Encrypted:false
                                                        SSDEEP:6144:TcvbKtafcxene0F2HZPM8RGYcBlKmM5r68ISxNXmAEFD7:TcjKtyIcP8XJISxo9
                                                        MD5:2AA4E0C2D66B430B14A5F019560612C5
                                                        SHA1:57C52DFF07F512CA7BA850B0F7551CA24CD19992
                                                        SHA-256:3F47731CF7BC3CFE2BADEBC5964EC1E58BE8F196ECCF1C72C43FD9A74A827995
                                                        SHA-512:FE7222E698530EF05591AEF3DFCBA6C907FED132DB6718D247040822E383AD755C5D946D57A5B11AE61B27408882266B671EE8632218EA2EF44C61353893DC1F
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=LEikZe,_b,_tp,byfTOb,lsjVmc,yRXbo/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=n73qwf,SCuOPb,IZT63,vfuNJf,UUJqVe,ws9Tlc,siKnQd,XVq9Qb,STuCOe,njlZCf,m9oV,vjKJJ,y5vRwf,iyZMqd,NTMZac,mzzZzc,rCcCxc,vvMGie,K1ZKnb,ziZ8Mc,b3kMqb,mvkUhe,CMcBD,Fndnac,t2srLd,EN3i8d,z0u0L,xiZRqc,NOeYWe,O6y8ed,L9OGUe,PrPYRd,MpJwZc,qPfo0c,cYShmd,hc6Ubd,Rkm0ef,KUM7Z,oLggrd,inNHtf,L1AAkb,WpP9Yc,lwddkf,gJzDyc,SpsfSb,aC1iue,tUnxGc,aW3pY,ZakeSe,EFQ78c,xQtZb,I6YDgd,zbML3c,zr1jrb,vHEMJe,YHI3We,YTxL4,bSspM,Uas9Hd,zy0vNb,K0PMbc,AvtSve,qmdT9,MY7mZe,xBaz7b,GwYlN,eVCnO,EIOG1e,LDQI"
                                                        Preview:"use strict";_F_installCss(".r4WGQb{position:relative}.Dl08I>:first-child{margin-top:0}.Dl08I>:last-child{margin-bottom:0}.IzwVE{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-family:\"Google Sans\",roboto,\"Noto Sans Myanmar UI\",arial,sans-serif;font-size:1.25rem;font-weight:400;letter-spacing:0rem;line-height:1.2}.l5PPKe{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-size:1rem}.l5PPKe .dMNVAe{margin:0;padding:0}.l5PPKe>:first-child{margin-top:0;padding-top:0}.l5PPKe>:last-child{margin-bottom:0;padding-bottom:0}.Dl08I{margin:0;padding:0;position:relative}.Dl08I>.SmR8:only-child{padding-top:1px}.Dl08I>.SmR8:only-child::before{top:0}.Dl08I>.SmR8:not(first-child){padding-bottom:1px}.Dl08I>.SmR8::after{bottom:0}.Dl08I>.SmR8:only-child::before,.Dl08I>.SmR8::after{border-bottom:1px solid #c4c7c5;border-bottom:1px solid var(--gm3-sys-color-outline-variant,#c4c7c5);content:\"\";height:0;left:0;position:absolute;width:100%}.aZvCDf{margin-top:8px;margin-left
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (2907)
                                                        Category:downloaded
                                                        Size (bytes):22833
                                                        Entropy (8bit):5.425034548615223
                                                        Encrypted:false
                                                        SSDEEP:384:7lFo6ZEdpgtmyiPixV9OX9gMBpHkHnfst9lZulagGcwYHiRFjJzN7:77o6ZviPixV8xpEHn89l4IgGcwYCRtb7
                                                        MD5:749B18538FE32BFE0815D75F899F5B21
                                                        SHA1:AF95A019211AF69F752A43CAA54A83C2AFD41D28
                                                        SHA-256:116B2687C1D5E00DB56A79894AB0C12D4E2E000B9379B7E7AD751B84DF611F3F
                                                        SHA-512:E4B6F4556AA0FD9979BB52681508F5E26FFB256473803F74F7F5C8D93FA3636D7D0A5835618FBC6123022805CE0D9616A7451A0F302C665E28A6090B5D588505
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=RqjULd"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.uu.prototype.da=_.ca(40,function(){return _.rj(this,3)});_.$y=function(a,b){this.key=a;this.defaultValue=!1;this.flagName=b};_.$y.prototype.ctor=function(a){return typeof a==="boolean"?a:this.defaultValue};_.az=function(){this.ka=!0;var a=_.vj(_.dk(_.Be("TSDtV",window),_.zya),_.uu,1,_.qj())[0];if(a){var b={};for(var c=_.n(_.vj(a,_.Aya,2,_.qj())),d=c.next();!d.done;d=c.next()){d=d.value;var e=_.Jj(d,1).toString();switch(_.tj(d,_.vu)){case 3:b[e]=_.Hj(d,_.lj(d,_.vu,3));break;case 2:b[e]=_.Jj(d,_.lj(d,_.vu,2));break;case 4:b[e]=_.Kj(d,_.lj(d,_.vu,4));break;case 5:b[e]=_.Lj(d,_.lj(d,_.vu,5));break;case 6:b[e]=_.Pj(d,_.ff,6,_.vu);break;default:throw Error("jd`"+_.tj(d,_.vu));}}}else b={};this.ea=b;this.token=.a?a.da():null};_.az.prototype.aa=function(a){if(!this.ka||a.key in this.ea)a=a.ctor(this.ea[a.key]);else if(_.Be("nQyAE",window)){var b=_.Cya(a.flagName);if(b===null)a=a.de
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:HTML document, ASCII text, with very long lines (681)
                                                        Category:downloaded
                                                        Size (bytes):4066
                                                        Entropy (8bit):5.363016925556486
                                                        Encrypted:false
                                                        SSDEEP:96:G2CiFZX5BReR68ujioIRVrqtyzBeTV6SfyAKLif9c7w:bCMZXVeR6jiosVrqtyzBaImyAKw9x
                                                        MD5:FC5E597D923838E10390DADD12651A81
                                                        SHA1:C9959F8D539DB5DF07B8246EC12539B6A9CC101F
                                                        SHA-256:A7EBD5280C50AE93C061EAE1E9727329E015E97531F8F2D82D0E3EA76ADB37B4
                                                        SHA-512:784CA572808F184A849388723FBB3701E6981D885BBA8A330A933F90BF0B36A2E4A491D4463A27911B1D9F7A7134F23E15F187FC7CB4554EAE9BC252513EED7C
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=sOXFj,q0xTif,ZZ4WUe"
                                                        Preview:"use strict";_F_installCss(".N7rBcd{overflow-x:auto}sentinel{}");.this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.vg(_.aqa);._.k("sOXFj");.var tu=function(a){_.W.call(this,a.Fa)};_.J(tu,_.W);tu.Ba=_.W.Ba;tu.prototype.aa=function(a){return a()};_.nu(_.$pa,tu);._.l();._.k("oGtAuc");._.yya=new _.pf(_.aqa);._.l();._.k("q0xTif");.var sza=function(a){var b=function(d){_.Sn(d)&&(_.Sn(d).Jc=null,_.Du(d,null));d.XyHi9&&(d.XyHi9=null)};b(a);a=a.querySelectorAll("[c-wiz]");for(var c=0;c<a.length;c++)b(a[c])},Pu=function(a){_.kt.call(this,a.Fa);this.Qa=this.dom=null;if(this.kl()){var b=_.zm(this.Ug(),[_.Em,_.Dm]);b=_.ni([b[_.Em],b[_.Dm]]).then(function(c){this.Qa=c[0];this.dom=c[1]},null,this);_.hu(this,b)}this.Ra=a.lm.zea};_.J(Pu,_.kt);Pu.Ba=function(){return{lm:{zea:function(a){return _.Ue(a)}}}};Pu.prototype.zp=function(a){return this.Ra.zp(a)};.Pu.prototype.getData=function(a){return this.Ra.getData(a)};Pu.prototype.qo=function(){_.Kt(this.d
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
                                                        Category:downloaded
                                                        Size (bytes):52280
                                                        Entropy (8bit):7.995413196679271
                                                        Encrypted:true
                                                        SSDEEP:1536:1rvqtK8DZilXxwJ8mMwAZy7phqsFLdG3B4d:xytBZits8bw4wzbFxG3B4d
                                                        MD5:F61F0D4D0F968D5BBA39A84C76277E1A
                                                        SHA1:AA3693EA140ECA418B4B2A30F6A68F6F43B4BEB2
                                                        SHA-256:57147F08949ABABE7DEEF611435AE418475A693E3823769A25C2A39B6EAD9CCC
                                                        SHA-512:6C3BD90F709BCF9151C9ED9FFEA55C4F6883E7FDA2A4E26BF018C83FE1CFBE4F4AA0DB080D6D024070D53B2257472C399C8AC44EEFD38B9445640EFA85D5C487
                                                        Malicious:false
                                                        URL:https://fonts.gstatic.com/s/googlesans/v58/4UaRrENHsxJlGDuGo1OIlJfC6l_24rlCK1Yo_Iq2vgCI.woff2
                                                        Preview:wOF2.......8.....................................^...$..4?HVAR..?MVAR9.`?STAT.*',..J/.......`..(..Z.0..R.6.$.... .....K..[..q..c..T.....>.P.j.`.w..#...%......N.".....$..3.0.6......... .L.rX/r[j.y.|*(.4.%#.....2.v.m..-..%.....;-.Y.{..&..O=#l@...k..7g..ZI...#.Z./+T..r7...M..3).Z%.x....s..sL..[A!.5*1w'/.8V..2Z..%.X.h.o.).]..9..Q`.$.....7..kZ.~O........d..g.n.d.Rw+&....Cz..uy#..fz,(.J....v.%..`..9.....h...?O..:...c%.....6s....xl..#...5..._......1.>.)"U.4 W....?%......6//!$...!.n9C@n...........!""^.....W..Z<.7.x.."UT.T....E.."R>.R..t.....H d..e_.K../.+8.Q.P.ZQ....;...U....]......._.e*......71.?.7.ORv.?...l...G|.P...|:...I.X..2.,.L........d.g.]}W#uW]QnuP-s.;.-Y.....].......C..j_.M0...y.......J..........NY..@A...,....-.F......'..w./j5g.vUS...U..0.&...y7.LP.....%.....Y......Y..D. e.A..G.?.$.......6...eaK.n5.m...N...,...+BCl..L> .E9~.b[.w.x....6<...}.e...%V....O.......*.?...a..#[eE.4..p..$...].....%......o._......N.._~..El....b..A.0.r8.....|..D.d..
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (755)
                                                        Category:downloaded
                                                        Size (bytes):1460
                                                        Entropy (8bit):5.291808298251231
                                                        Encrypted:false
                                                        SSDEEP:24:kMYD7DuZvuhqCsNRxoYTY9/qoVk7hz1l2p6vDMW94uEQOeGbCx4VGbgCSFBV87OU:o7DuZWhv6oy12kvwKEeGbC6GbHSh/Hrw
                                                        MD5:4CA7ADFE744A690411EA4D3EA8DB9E4B
                                                        SHA1:2CF1777A199E25378D330DA68BED1871B5C5BC32
                                                        SHA-256:128129BA736B3094323499B0498A5B3A909C1529717461C34B70080A5B1603BD
                                                        SHA-512:8BD3477AF41D1F0FE74AFFCB177BEC0F5F4FDCBBA6BD29D9C2567E6FFDEF5DEB7FF74BF348F33209C39D7BB4958E748DF6731D3DC8F6947352276BC92EAF9E79
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=P6sQOc"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("lOO0Vd");._.VZa=new _.pf(_.Am);._.l();._.k("P6sQOc");.var $Za=!!(_.Kh[1]&16);var b_a=function(a,b,c,d,e){this.ea=a;this.wa=b;this.ka=c;this.Ca=d;this.Ga=e;this.aa=0;this.da=a_a(this)},c_a=function(a){var b={};_.La(a.yS(),function(e){b[e]=!0});var c=a.pS(),d=a.tS();return new b_a(a.qP(),c.aa()*1E3,a.WR(),d.aa()*1E3,b)},a_a=function(a){return Math.random()*Math.min(a.wa*Math.pow(a.ka,a.aa),a.Ca)},OG=function(a,b){return a.aa>=a.ea?!1:b!=null?!!a.Ga[b]:!0};var PG=function(a){_.W.call(this,a.Fa);this.da=a.Ea.EV;this.ea=a.Ea.metadata;a=a.Ea.Xga;this.fetch=a.fetch.bind(a)};_.J(PG,_.W);PG.Ba=function(){return{Ea:{EV:_.YZa,metadata:_.VZa,Xga:_.OZa}}};PG.prototype.aa=function(a,b){if(this.ea.getType(a.Od())!==1)return _.Sm(a);var c=this.da.eV;return(c=c?c_a(c):null)&&OG(c)?_.wya(a,d_a(this,a,b,c)):_.Sm(a)};.var d_a=function(a,b,c,d){return c.then(function(e){return e},function(e)
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (553)
                                                        Category:downloaded
                                                        Size (bytes):743936
                                                        Entropy (8bit):5.791086230020914
                                                        Encrypted:false
                                                        SSDEEP:6144:YVXWBQkPdzg5pTX1ROv/duPzd8C3s891/N:Nfd8j91/N
                                                        MD5:1A3606C746E7B1C949D9078E8E8C1244
                                                        SHA1:56A3EB1E93E61ACD7AAD39DC3526CB60E23651B1
                                                        SHA-256:5F49AE5162183E2EF6F082B29EC99F18DB0212B8ADDB03699B1BFB0AC7869742
                                                        SHA-512:F2D15243311C472331C5F3F083BB6C18D38EC0247A3F3CBAFD96DBA40E4EAE489CDA04176672E39FE3760EF7347596B2A5EAB0FB0125E881EF514475C99863B9
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/excm=_b,_tp,identifierview/ed=1/dg=0/wt=2/ujg=1/rs=AOaEmlE6O04h0gj7Nu50q-nmaRKM6WWcJw/m=_b,_tp"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([0x286081c4, 0x2046d860, 0x39e13c40, 0x14501e80, 0xe420, 0x0, 0x1a000000, 0x1d000003, 0xc, ]);./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright 2024 Google, Inc. SPDX-License-Identifier: MIT.*/./*. SPDX-License-Identifier: Apache-2.0.*/./*. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var baa,daa,Ma,Sa,gaa,iaa,jb,qaa,waa,Caa,Haa,Kaa,Jb,Laa,Ob,Qb,Rb,Maa,Naa,Sb,Oaa,Paa,Qaa,Yb,Vaa,Xaa,ec,fc,gc,bba,cba,gba,jba,lba,mba,qba,tba,nba,sba,rba,pba,oba,uba,yba,Cba,Dba,Aba,Hc,Ic,Gba,Iba,Mba,Nba,Oba,Pba,Lba,Qba,Sba,dd,Uba,Vba,Xba,Zba,Yba,aca,bca,cca,dca,fca,eca,hca,ica,jca,kca,nca,
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (533)
                                                        Category:downloaded
                                                        Size (bytes):9210
                                                        Entropy (8bit):5.404371326611379
                                                        Encrypted:false
                                                        SSDEEP:192:EEFZpeip4HzZlY0If0Ma23jcUcrhCx6VD1TYPi8:Es/p4jgjUhtD1TY68
                                                        MD5:21E893B65627B397E22619A9F5BB9662
                                                        SHA1:F561B0F66211C1E7B22F94B4935C312AB7087E85
                                                        SHA-256:FFA9B8BC8EF2CDFF5EB4BA1A0BA1710A253A5B42535E2A369D5026967DCF4673
                                                        SHA-512:3DE3CD6A4E9B06AB3EB324E90A40B5F2AEEA8D7D6A2651C310E993CF79EEB5AC6E2E33C587F46B2DD20CC862354FD1A61AEBB9B990E6805F6629404BA285F8FA
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,byfTOb,cYShmd,eVCnO,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,qPfo0c,qmdT9,rCcCxc,siKnQd,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ltDFwf,SD8Jgb,rmumx,E87wgc,qPYxq,Tbb4sb,pxq3x,f8Gu1e,soHxf,YgOFye,bTi8wc,ywOR5c,PHUIyb"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.qNa=_.y("SD8Jgb",[]);._.GX=function(a,b){if(typeof b==="string")a.Lc(b);else if(b instanceof _.Fp&&b.ia&&b.ia===_.A)b=_.Ya(b.Lw()),a.empty().append(b);else if(b instanceof _.Ua)b=_.Ya(b),a.empty().append(b);else if(b instanceof Node)a.empty().append(b);else throw Error("Vf");};_.HX=function(a){var b=_.Io(a,"[jsslot]");if(b.size()>0)return b;b=new _.Go([_.Kk("span")]);_.Jo(b,"jsslot","");a.empty().append(b);return b};_.NLb=function(a){return a===null||typeof a==="string"&&_.Hi(a)};._.k("SD8Jgb");._.MX=function(a){_.X.call(this,a.Fa);this.Ua=a.controller.Ua;this.od=a.controllers.od[0]||null;this.header=a.controller.header;this.nav=a.controller.nav;var b;(b=this.oa().find("button:not([type])").el())==null||b.setAttribute("type","button")};_.J(_.MX,_.X);_.MX.Ba=function(){return{controller:{Ua:{jsname:"n7vHCb",ctor:_.mv},header:{jsname:"tJHJj",ctor:_.mv},nav:{jsname:"DH6Rkf",ct
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (1307)
                                                        Category:downloaded
                                                        Size (bytes):120286
                                                        Entropy (8bit):5.534339002127654
                                                        Encrypted:false
                                                        SSDEEP:3072:4TLXdfN7ncu8VG+hzH6hpMSrBg5X3xYFEGbvK++1k:CBnc3jpYMSrBg5X3OV
                                                        MD5:ADF2505928336027BFEF55D98E46B7C5
                                                        SHA1:32572AAFD5D7E2BFFBD037C7000F760DF743BC76
                                                        SHA-256:852239A79CD9626A7E7F39B095C9DE188C112BE1E36EC1050A7C587AC79754A0
                                                        SHA-512:DCB7254D9D067A358691B648A59C7CDD61057E415A2E4A8B491FC6CA6DE5900F7DEF6D7BAB204E373B24F5A9AD18DB65FE750E7D04FFF34A168AD6A5773593F7
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=LEikZe,_b,_tp,byfTOb,lsjVmc/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=yRXbo"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{.var axa,bxa;axa=function(a){return a.hasOwnProperty("Ba")?a.Ba:function(){return{}}};.bxa=function(a,b,c){if(!a||a===_.Qh)return _.Ue({});var d=axa(a).call(a,c),e=_.$da(b,d!=null?d:{});d=Object.getPrototypeOf(a);return bxa(d,b,c).flatMap(function(f){return e.map(function(g){g.Fa=f;return g})}).map(function(f){return f},function(f){a:{var g,m;var p=(m=(g=a.displayName)!=null?g:c.toString())!=null?m:a.name;if(f==null)f=Error("Bc`"+p+"`"+f);else if(typeof f==="string")f=Error("Cc`"+p+"`"+f);else if(f.message){p="Failed to retrieve dependencies of service "+p+": "+f.message;try{f.message=.p}catch(q){p=Error("Dc`"+p+"`"+q);break a}}else f=Error("Cc`"+p+"`"+JSON.stringify(f));p=f}return p})};_.jt=function(a,b,c){return b.ctor?b.Uq?b.AN(a,b.ctor,b.ii,c,void 0,!0):b.AN(a,b.ctor,b.ii,c,!0):b.Uq?b.AN(a,b.ii,c,void 0,!0):b.AN(a,b.ii,c,!0)};_.kt=function(a){_.Qh.call(this);var b,c;this.k
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (570)
                                                        Category:downloaded
                                                        Size (bytes):3467
                                                        Entropy (8bit):5.514745431912774
                                                        Encrypted:false
                                                        SSDEEP:96:ozbld2fNUmeqJNizhNtt1W8t//loyIpXmdVE2w:onSKE8PWe/Cy4X3j
                                                        MD5:8DEF399E8355ABC23E64505281005099
                                                        SHA1:24FF74C3AEFD7696D84FF148465DF4B1B60B1696
                                                        SHA-256:F128D7218E1286B05DF11310AD3C8F4CF781402698E45448850D2A3A22F5F185
                                                        SHA-512:33721DD47658D8E12ADF6BD9E9316EB89F5B6297927F7FD60F954E04B829DCBF0E1AE6DDD9A3401F45E0011AE4B1397B960C218238A3D0F633A2173D8E604082
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,wg1P6b,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=Wt6vjf,hhhU8,FCpbqb,WhJNk"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("Wt6vjf");.var cya=function(){var a=_.He();return _.Lj(a,1)},Yt=function(a){this.Da=_.t(a,0,Yt.messageId)};_.J(Yt,_.w);Yt.prototype.Ha=function(){return _.Dj(this,1)};Yt.prototype.Va=function(a){return _.Vj(this,1,a)};Yt.messageId="f.bo";var Zt=function(){_.hm.call(this)};_.J(Zt,_.hm);Zt.prototype.xd=function(){this.CT=!1;dya(this);_.hm.prototype.xd.call(this)};Zt.prototype.aa=function(){eya(this);if(this.wC)return fya(this),!1;if(!this.KV)return $t(this),!0;this.dispatchEvent("p");if(!this.zP)return $t(this),!0;this.wM?(this.dispatchEvent("r"),$t(this)):fya(this);return!1};.var gya=function(a){var b=new _.ap(a.W4);a.qQ!=null&&_.Jn(b,"authuser",a.qQ);return b},fya=function(a){a.wC=!0;var b=gya(a),c="rt=r&f_uid="+_.pk(a.zP);_.cn(b,(0,_.bg)(a.ea,a),"POST",c)};.Zt.prototype.ea=function(a){a=a.target;eya(this);if(_.fn(a)){this.cK=0;if(this.wM)this.wC=!1,this.dispatchEvent("r"
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:downloaded
                                                        Size (bytes):84
                                                        Entropy (8bit):4.875266466142591
                                                        Encrypted:false
                                                        SSDEEP:3:DZFJu0+WVTBCq2Bjdw2KsJJuYHSKnZ:lFJuuVTBudw29nu4SKZ
                                                        MD5:87B6333E98B7620EA1FF98D1A837A39E
                                                        SHA1:105DE6815B0885357DE1414BFC0D77FCC9E924EF
                                                        SHA-256:DCD3C133C5C40BECD4100BBE6EDAE84C9735E778E4234A5E8395C56FF8A733BA
                                                        SHA-512:867D7943D813685FAA76394E53199750C55817E836FD19C933F74D11E9657CE66719A6D6B2E39EE1DE62358BCE364E38A55F4E138DF92337DE6985DDCD5D0994
                                                        Malicious:false
                                                        URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISHgmA6QC9dWevzxIFDRkBE_oSBQ3oIX6GEgUN05ioBw==?alt=proto
                                                        Preview:Cj0KBw0ZARP6GgAKKQ3oIX6GGgQISxgCKhwIClIYCg5AIS4jJF8qLSY/Ky8lLBABGP////8PCgcN05ioBxoA
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (395)
                                                        Category:downloaded
                                                        Size (bytes):1608
                                                        Entropy (8bit):5.257113147606035
                                                        Encrypted:false
                                                        SSDEEP:48:o72ZrNZ4yNAbU+15fMxIdf5WENoBCbw7DbG2bEJrw:oyNNAY+1i4HoBNG2Ilw
                                                        MD5:F06E2DC5CC446B39F878B5F8E4D78418
                                                        SHA1:9F1F34FDD8F8DAB942A9B95D9F720587B6F6AD48
                                                        SHA-256:118E4D2FE7CEF205F9AFC87636554C6D8220882B158333EE3D1990282D158B8F
                                                        SHA-512:893C4F883CD1C88C6AAF5A6E7F232D62823A53E1FFDE5C1C52BB066D75781DD041F4D281CDBF18070D921CE862652D8863E2B9D5E0190CFA4128890D62C44168
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=w9hDv,ZDZcre,A7fCU"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("w9hDv");._.vg(_.Hla);_.eA=function(a){_.W.call(this,a.Fa);this.aa=a.Xa.cache};_.J(_.eA,_.W);_.eA.Ba=function(){return{Xa:{cache:_.dt}}};_.eA.prototype.execute=function(a){_.Bb(a,function(b){var c;_.$e(b)&&(c=b.eb.kc(b.kb));c&&this.aa.xG(c)},this);return{}};_.nu(_.Nla,_.eA);._.l();._.k("ZDZcre");.var fH=function(a){_.W.call(this,a.Fa);this.Wl=a.Ea.Wl;this.d4=a.Ea.metadata;this.aa=a.Ea.ot};_.J(fH,_.W);fH.Ba=function(){return{Ea:{Wl:_.KG,metadata:_.VZa,ot:_.HG}}};fH.prototype.execute=function(a){var b=this;a=this.aa.create(a);return _.Bb(a,function(c){var d=b.d4.getType(c.Od())===2?b.Wl.Rb(c):b.Wl.fetch(c);return _.yl(c,_.LG)?d.then(function(e){return _.Dd(e)}):d},this)};_.nu(_.Sla,fH);._.l();._.k("K5nYTd");._.UZa=new _.pf(_.Ola);._.l();._.k("sP4Vbe");.._.l();._.k("kMFpHd");.._.l();._.k("A7fCU");.var NG=function(a){_.W.call(this,a.Fa);this.aa=a.Ea.tQ};_.J(NG,_.W);NG.Ba=func
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (522)
                                                        Category:downloaded
                                                        Size (bytes):5050
                                                        Entropy (8bit):5.289052544075544
                                                        Encrypted:false
                                                        SSDEEP:96:o4We0hP7OBFXYvB1sig3Fd8HkaXzLmUrv8Vh1WJlLQXT2v2gqw:655758Fd8HkaPZ0GmAD
                                                        MD5:26E26FD11772DFF5C7004BEA334289CC
                                                        SHA1:638DAAF541BDE31E95AEE4F8ADA677434D7051DB
                                                        SHA-256:ADFE3E4960982F5EF4C043052A9990D8683C5FC2B590E817B6B1A5774DDE2CE3
                                                        SHA-512:C31929EB6D1C60D6A84A2574FF60490394A6D6F9B354972F3328952F570D80B3F2AEC916B0E1B66DDB1AC056EB75BFAC477E7AF631D0AD1810EDBAF025465D66
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=wg1P6b"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.jNa=_.y("wg1P6b",[_.TA,_.Cn,_.Kn]);._.k("wg1P6b");.var Z5a;Z5a=_.mh(["aria-"]);._.uJ=function(a){_.X.call(this,a.Fa);this.Ka=this.wa=this.aa=this.viewportElement=this.Na=null;this.Hc=a.Ea.ff;this.ab=a.Ea.focus;this.Fc=a.Ea.Fc;this.ea=this.Pi();a=-1*parseInt(_.Co(this.Pi().el(),"marginTop")||"0",10);var b=parseInt(_.Co(this.Pi().el(),"marginBottom")||"0",10);this.Ta={top:a,right:0,bottom:b,left:0};a=_.cf(this.getData("isMenuDynamic"),!1);b=_.cf(this.getData("isMenuHoisted"),!1);this.Ga=a?1:b?2:0;this.ka=!1;this.Ca=1;this.Ga!==1&&(this.aa=this.Sa("U0exHf").children().Wc(0),_.ku(this,.$5a(this,this.aa.el())));_.kF(this.oa())&&(a=this.oa().el(),b=this.we.bind(this),a.__soy_skip_handler=b)};_.J(_.uJ,_.X);_.uJ.Ba=function(){return{Ea:{ff:_.ZE,focus:_.KE,Fc:_.ru}}};_.uJ.prototype.xF=function(a){var b=a.source;this.Na=b;var c;((c=a.data)==null?0:c.fz)?(a=a.data.fz,this.Ca=a==="MOUS
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (1694)
                                                        Category:downloaded
                                                        Size (bytes):32500
                                                        Entropy (8bit):5.378903546681047
                                                        Encrypted:false
                                                        SSDEEP:768:zYlbuROstb0e39nKGrkysU0smpu4OLOdzIf1p/5GeSsngurz6aKEEEGo/:zYl61Cysbu4OLOdzIfrIen72ZFo/
                                                        MD5:BF4BF9728A7C302FBA5B14F3D0F1878B
                                                        SHA1:2607CA7A93710D629400077FF3602CB207E6F53D
                                                        SHA-256:8981E7B228DF7D6A8797C0CD1E9B0F1F88337D5F0E1C27A04E7A57D2C4309798
                                                        SHA-512:AC9E170FC3AFDC0CF6BB8E926B93EF129A5FAD1BBA51B60BABCF3555E9B652E98F86A00FB099879DED35DD3FFE72ECFA597E20E6CA8CF402BEDEC40F78412EDA
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=_b,_tp/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=byfTOb,lsjVmc,LEikZe"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{.var Aua=function(a,b){this.da=a;this.ea=b;if(!c){var c=new _.ap("//www.google.com/images/cleardot.gif");_.op(c)}this.ka=c};_.h=Aua.prototype;_.h.Zc=null;_.h.lZ=1E4;_.h.bA=!1;_.h.nQ=0;_.h.zJ=null;_.h.bV=null;_.h.setTimeout=function(a){this.lZ=a};_.h.start=function(){if(this.bA)throw Error("dc");this.bA=!0;this.nQ=0;Bua(this)};_.h.stop=function(){Cua(this);this.bA=!1};.var Bua=function(a){a.nQ++;navigator!==null&&"onLine"in navigator&&!navigator.onLine?_.km((0,_.bg)(a.aH,a,!1),0):(a.aa=new Image,a.aa.onload=(0,_.bg)(a.Fja,a),a.aa.onerror=(0,_.bg)(a.Eja,a),a.aa.onabort=(0,_.bg)(a.Dja,a),a.zJ=_.km(a.Gja,a.lZ,a),a.aa.src=String(a.ka))};_.h=Aua.prototype;_.h.Fja=function(){this.aH(!0)};_.h.Eja=function(){this.aH(!1)};_.h.Dja=function(){this.aH(!1)};_.h.Gja=function(){this.aH(!1)};._.h.aH=function(a){Cua(this);a?(this.bA=!1,this.da.call(this.ea,!0)):this.nQ<=0?Bua(this):(this.bA=!1,
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):6.582201757476791
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:file.exe
                                                        File size:918'528 bytes
                                                        MD5:9c54dc2f18fc09f760ab7267a4548200
                                                        SHA1:a9a5955aaa3d54664d49e33b1ef3d5a1972d2e0c
                                                        SHA256:6c70fcc3b15118416a0308d70360ffd66e5b08d569340ea0405578035a79d099
                                                        SHA512:3f214bb3c8cccc86897d58156b48de12b6e26f74096c000dd18065b4b2269628b408f157b7325ae567ed33a9489ef4b48bb27e47b5e75d5b59a46421600036c4
                                                        SSDEEP:12288:PqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgapT42:PqDEvCTbMWu7rQYlBQcBiT6rprG8atv
                                                        TLSH:46159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                                                        File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                        Icon Hash:aaf3e3e3938382a0
                                                        Entrypoint:0x420577
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x66FD6DCD [Wed Oct 2 15:59:09 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:1
                                                        File Version Major:5
                                                        File Version Minor:1
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:1
                                                        Import Hash:948cc502fe9226992dce9417f952fce3
                                                        Instruction
                                                        call 00007F5668D19313h
                                                        jmp 00007F5668D18C1Fh
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        push dword ptr [ebp+08h]
                                                        mov esi, ecx
                                                        call 00007F5668D18DFDh
                                                        mov dword ptr [esi], 0049FDF0h
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        and dword ptr [ecx+04h], 00000000h
                                                        mov eax, ecx
                                                        and dword ptr [ecx+08h], 00000000h
                                                        mov dword ptr [ecx+04h], 0049FDF8h
                                                        mov dword ptr [ecx], 0049FDF0h
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        push dword ptr [ebp+08h]
                                                        mov esi, ecx
                                                        call 00007F5668D18DCAh
                                                        mov dword ptr [esi], 0049FE0Ch
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        and dword ptr [ecx+04h], 00000000h
                                                        mov eax, ecx
                                                        and dword ptr [ecx+08h], 00000000h
                                                        mov dword ptr [ecx+04h], 0049FE14h
                                                        mov dword ptr [ecx], 0049FE0Ch
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        mov esi, ecx
                                                        lea eax, dword ptr [esi+04h]
                                                        mov dword ptr [esi], 0049FDD0h
                                                        and dword ptr [eax], 00000000h
                                                        and dword ptr [eax+04h], 00000000h
                                                        push eax
                                                        mov eax, dword ptr [ebp+08h]
                                                        add eax, 04h
                                                        push eax
                                                        call 00007F5668D1B9BDh
                                                        pop ecx
                                                        pop ecx
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        lea eax, dword ptr [ecx+04h]
                                                        mov dword ptr [ecx], 0049FDD0h
                                                        push eax
                                                        call 00007F5668D1BA08h
                                                        pop ecx
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        mov esi, ecx
                                                        lea eax, dword ptr [esi+04h]
                                                        mov dword ptr [esi], 0049FDD0h
                                                        push eax
                                                        call 00007F5668D1B9F1h
                                                        test byte ptr [ebp+08h], 00000001h
                                                        pop ecx
                                                        Programming Language:
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x98f8.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0xd40000x98f80x9a00c9e6aeb23358c23a09ca3c733a17803aFalse0.3019987824675325data5.27940347316942IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                        RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                        RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                        RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                        RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                        RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                        RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                        RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                        RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                        RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                        RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                        RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                        RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                        RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                        RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                        RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                        RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                        RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                        RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                        RT_RCDATA0xdc7b80xbc0data1.003656914893617
                                                        RT_GROUP_ICON0xdd3780x76dataEnglishGreat Britain0.6610169491525424
                                                        RT_GROUP_ICON0xdd3f00x14dataEnglishGreat Britain1.25
                                                        RT_GROUP_ICON0xdd4040x14dataEnglishGreat Britain1.15
                                                        RT_GROUP_ICON0xdd4180x14dataEnglishGreat Britain1.25
                                                        RT_VERSION0xdd42c0xdcdataEnglishGreat Britain0.6181818181818182
                                                        RT_MANIFEST0xdd5080x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                        DLLImport
                                                        WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                        VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                        MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                        WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                        PSAPI.DLLGetProcessMemoryInfo
                                                        IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                        USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                        UxTheme.dllIsThemeActive
                                                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                        USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                        GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                        COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                        SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                        OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishGreat Britain
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Oct 2, 2024 18:36:38.114514112 CEST49673443192.168.2.523.1.237.91
                                                        Oct 2, 2024 18:36:46.616177082 CEST49706443192.168.2.5142.250.184.238
                                                        Oct 2, 2024 18:36:46.616233110 CEST44349706142.250.184.238192.168.2.5
                                                        Oct 2, 2024 18:36:46.616302013 CEST49706443192.168.2.5142.250.184.238
                                                        Oct 2, 2024 18:36:46.618669033 CEST49706443192.168.2.5142.250.184.238
                                                        Oct 2, 2024 18:36:46.618707895 CEST44349706142.250.184.238192.168.2.5
                                                        Oct 2, 2024 18:36:47.339309931 CEST44349706142.250.184.238192.168.2.5
                                                        Oct 2, 2024 18:36:47.342298031 CEST49706443192.168.2.5142.250.184.238
                                                        Oct 2, 2024 18:36:47.342339993 CEST44349706142.250.184.238192.168.2.5
                                                        Oct 2, 2024 18:36:47.342901945 CEST44349706142.250.184.238192.168.2.5
                                                        Oct 2, 2024 18:36:47.342971087 CEST49706443192.168.2.5142.250.184.238
                                                        Oct 2, 2024 18:36:47.343933105 CEST44349706142.250.184.238192.168.2.5
                                                        Oct 2, 2024 18:36:47.343990088 CEST49706443192.168.2.5142.250.184.238
                                                        Oct 2, 2024 18:36:47.344702005 CEST49706443192.168.2.5142.250.184.238
                                                        Oct 2, 2024 18:36:47.344794989 CEST44349706142.250.184.238192.168.2.5
                                                        Oct 2, 2024 18:36:47.344862938 CEST49706443192.168.2.5142.250.184.238
                                                        Oct 2, 2024 18:36:47.344882011 CEST44349706142.250.184.238192.168.2.5
                                                        Oct 2, 2024 18:36:47.398473024 CEST49706443192.168.2.5142.250.184.238
                                                        Oct 2, 2024 18:36:47.570244074 CEST49674443192.168.2.523.1.237.91
                                                        Oct 2, 2024 18:36:47.570252895 CEST49675443192.168.2.523.1.237.91
                                                        Oct 2, 2024 18:36:47.636240005 CEST44349706142.250.184.238192.168.2.5
                                                        Oct 2, 2024 18:36:47.636338949 CEST44349706142.250.184.238192.168.2.5
                                                        Oct 2, 2024 18:36:47.636599064 CEST49706443192.168.2.5142.250.184.238
                                                        Oct 2, 2024 18:36:47.637218952 CEST49706443192.168.2.5142.250.184.238
                                                        Oct 2, 2024 18:36:47.637264013 CEST44349706142.250.184.238192.168.2.5
                                                        Oct 2, 2024 18:36:47.648082018 CEST49711443192.168.2.5216.58.212.174
                                                        Oct 2, 2024 18:36:47.648133039 CEST44349711216.58.212.174192.168.2.5
                                                        Oct 2, 2024 18:36:47.651237011 CEST49711443192.168.2.5216.58.212.174
                                                        Oct 2, 2024 18:36:47.651571035 CEST49711443192.168.2.5216.58.212.174
                                                        Oct 2, 2024 18:36:47.651586056 CEST44349711216.58.212.174192.168.2.5
                                                        Oct 2, 2024 18:36:47.726517916 CEST49673443192.168.2.523.1.237.91
                                                        Oct 2, 2024 18:36:48.286433935 CEST44349711216.58.212.174192.168.2.5
                                                        Oct 2, 2024 18:36:48.286899090 CEST49711443192.168.2.5216.58.212.174
                                                        Oct 2, 2024 18:36:48.286982059 CEST44349711216.58.212.174192.168.2.5
                                                        Oct 2, 2024 18:36:48.288352966 CEST44349711216.58.212.174192.168.2.5
                                                        Oct 2, 2024 18:36:48.288446903 CEST49711443192.168.2.5216.58.212.174
                                                        Oct 2, 2024 18:36:48.290824890 CEST44349711216.58.212.174192.168.2.5
                                                        Oct 2, 2024 18:36:48.290894032 CEST49711443192.168.2.5216.58.212.174
                                                        Oct 2, 2024 18:36:48.292112112 CEST49711443192.168.2.5216.58.212.174
                                                        Oct 2, 2024 18:36:48.292283058 CEST49711443192.168.2.5216.58.212.174
                                                        Oct 2, 2024 18:36:48.292295933 CEST44349711216.58.212.174192.168.2.5
                                                        Oct 2, 2024 18:36:48.335892916 CEST49711443192.168.2.5216.58.212.174
                                                        Oct 2, 2024 18:36:48.335937023 CEST44349711216.58.212.174192.168.2.5
                                                        Oct 2, 2024 18:36:48.382985115 CEST49711443192.168.2.5216.58.212.174
                                                        Oct 2, 2024 18:36:48.595468044 CEST44349711216.58.212.174192.168.2.5
                                                        Oct 2, 2024 18:36:48.595525026 CEST44349711216.58.212.174192.168.2.5
                                                        Oct 2, 2024 18:36:48.595576048 CEST49711443192.168.2.5216.58.212.174
                                                        Oct 2, 2024 18:36:48.595604897 CEST44349711216.58.212.174192.168.2.5
                                                        Oct 2, 2024 18:36:48.595670938 CEST44349711216.58.212.174192.168.2.5
                                                        Oct 2, 2024 18:36:48.595721960 CEST49711443192.168.2.5216.58.212.174
                                                        Oct 2, 2024 18:36:48.597898006 CEST49711443192.168.2.5216.58.212.174
                                                        Oct 2, 2024 18:36:48.597910881 CEST44349711216.58.212.174192.168.2.5
                                                        Oct 2, 2024 18:36:48.708304882 CEST4971353192.168.2.51.1.1.1
                                                        Oct 2, 2024 18:36:48.713148117 CEST53497131.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:36:48.713215113 CEST4971353192.168.2.51.1.1.1
                                                        Oct 2, 2024 18:36:48.713571072 CEST4971353192.168.2.51.1.1.1
                                                        Oct 2, 2024 18:36:48.713581085 CEST4971353192.168.2.51.1.1.1
                                                        Oct 2, 2024 18:36:48.718492985 CEST53497131.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:36:48.718558073 CEST53497131.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:36:49.161638975 CEST4971353192.168.2.51.1.1.1
                                                        Oct 2, 2024 18:36:49.167686939 CEST53497131.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:36:49.167773008 CEST4971353192.168.2.51.1.1.1
                                                        Oct 2, 2024 18:36:49.359668970 CEST4434970323.1.237.91192.168.2.5
                                                        Oct 2, 2024 18:36:49.359766006 CEST49703443192.168.2.523.1.237.91
                                                        Oct 2, 2024 18:36:51.099647999 CEST49718443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:36:51.099744081 CEST44349718142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:36:51.099844933 CEST49718443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:36:51.100224972 CEST49718443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:36:51.100260973 CEST44349718142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:36:51.295958042 CEST49719443192.168.2.5184.28.90.27
                                                        Oct 2, 2024 18:36:51.296014071 CEST44349719184.28.90.27192.168.2.5
                                                        Oct 2, 2024 18:36:51.296097994 CEST49719443192.168.2.5184.28.90.27
                                                        Oct 2, 2024 18:36:51.297972918 CEST49719443192.168.2.5184.28.90.27
                                                        Oct 2, 2024 18:36:51.297992945 CEST44349719184.28.90.27192.168.2.5
                                                        Oct 2, 2024 18:36:51.750370979 CEST44349718142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:36:51.750598907 CEST49718443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:36:51.750627995 CEST44349718142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:36:51.752079964 CEST44349718142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:36:51.752238035 CEST49718443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:36:51.753380060 CEST49718443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:36:51.753470898 CEST44349718142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:36:51.804213047 CEST49718443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:36:51.804230928 CEST44349718142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:36:51.851103067 CEST49718443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:36:51.954556942 CEST44349719184.28.90.27192.168.2.5
                                                        Oct 2, 2024 18:36:51.954641104 CEST49719443192.168.2.5184.28.90.27
                                                        Oct 2, 2024 18:36:51.963465929 CEST49719443192.168.2.5184.28.90.27
                                                        Oct 2, 2024 18:36:51.963489056 CEST44349719184.28.90.27192.168.2.5
                                                        Oct 2, 2024 18:36:51.963831902 CEST44349719184.28.90.27192.168.2.5
                                                        Oct 2, 2024 18:36:52.004467010 CEST49719443192.168.2.5184.28.90.27
                                                        Oct 2, 2024 18:36:52.070466042 CEST49719443192.168.2.5184.28.90.27
                                                        Oct 2, 2024 18:36:52.111434937 CEST44349719184.28.90.27192.168.2.5
                                                        Oct 2, 2024 18:36:52.259377003 CEST44349719184.28.90.27192.168.2.5
                                                        Oct 2, 2024 18:36:52.259462118 CEST44349719184.28.90.27192.168.2.5
                                                        Oct 2, 2024 18:36:52.259516954 CEST49719443192.168.2.5184.28.90.27
                                                        Oct 2, 2024 18:36:52.259682894 CEST49719443192.168.2.5184.28.90.27
                                                        Oct 2, 2024 18:36:52.259682894 CEST49719443192.168.2.5184.28.90.27
                                                        Oct 2, 2024 18:36:52.259711981 CEST44349719184.28.90.27192.168.2.5
                                                        Oct 2, 2024 18:36:52.259726048 CEST44349719184.28.90.27192.168.2.5
                                                        Oct 2, 2024 18:36:52.341754913 CEST49724443192.168.2.5184.28.90.27
                                                        Oct 2, 2024 18:36:52.341804028 CEST44349724184.28.90.27192.168.2.5
                                                        Oct 2, 2024 18:36:52.341896057 CEST49724443192.168.2.5184.28.90.27
                                                        Oct 2, 2024 18:36:52.342165947 CEST49724443192.168.2.5184.28.90.27
                                                        Oct 2, 2024 18:36:52.342183113 CEST44349724184.28.90.27192.168.2.5
                                                        Oct 2, 2024 18:36:53.079586983 CEST44349724184.28.90.27192.168.2.5
                                                        Oct 2, 2024 18:36:53.079674006 CEST49724443192.168.2.5184.28.90.27
                                                        Oct 2, 2024 18:36:53.082348108 CEST49724443192.168.2.5184.28.90.27
                                                        Oct 2, 2024 18:36:53.082355022 CEST44349724184.28.90.27192.168.2.5
                                                        Oct 2, 2024 18:36:53.082602978 CEST44349724184.28.90.27192.168.2.5
                                                        Oct 2, 2024 18:36:53.084260941 CEST49724443192.168.2.5184.28.90.27
                                                        Oct 2, 2024 18:36:53.131407022 CEST44349724184.28.90.27192.168.2.5
                                                        Oct 2, 2024 18:36:53.355777025 CEST44349724184.28.90.27192.168.2.5
                                                        Oct 2, 2024 18:36:53.355843067 CEST44349724184.28.90.27192.168.2.5
                                                        Oct 2, 2024 18:36:53.355897903 CEST49724443192.168.2.5184.28.90.27
                                                        Oct 2, 2024 18:36:53.584796906 CEST49724443192.168.2.5184.28.90.27
                                                        Oct 2, 2024 18:36:53.584813118 CEST44349724184.28.90.27192.168.2.5
                                                        Oct 2, 2024 18:36:56.445370913 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:56.445429087 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:56.445650101 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:56.445924997 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:56.445983887 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.103607893 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.103902102 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.103946924 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.104505062 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.104584932 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.105500937 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.105571032 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.106477976 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.106561899 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.106767893 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.106779099 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.147923946 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.430428982 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.430567980 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.430665970 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.430775881 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.430775881 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.430819988 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.435945988 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.436034918 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.436063051 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.442478895 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.442543983 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.442549944 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.442584038 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.442630053 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.448791981 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.448872089 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.455245972 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.455319881 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.455336094 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.455346107 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.455391884 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.475923061 CEST49739443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:57.475972891 CEST44349739142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:57.476036072 CEST49739443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:57.479808092 CEST49739443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:57.479830027 CEST44349739142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:57.522898912 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.522994041 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.523071051 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.523130894 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.523130894 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.523170948 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.525707006 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.525798082 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.525810003 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.525840998 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.525888920 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.530778885 CEST49741443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:57.530827045 CEST44349741142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:57.531023979 CEST49741443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:57.531311989 CEST49741443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:57.531354904 CEST44349741142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:57.532329082 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.532407999 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.538448095 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.538547039 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.538564920 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.544709921 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.544792891 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.544806004 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.550872087 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.550944090 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.550961018 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.551338911 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.551352978 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.551373959 CEST44349736142.250.185.142192.168.2.5
                                                        Oct 2, 2024 18:36:57.551397085 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.551429033 CEST49736443192.168.2.5142.250.185.142
                                                        Oct 2, 2024 18:36:57.980884075 CEST49743443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:36:57.980943918 CEST4434974320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:36:57.981118917 CEST49743443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:36:57.984961987 CEST49743443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:36:57.984997034 CEST4434974320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:36:58.128833055 CEST44349739142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.153842926 CEST49739443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.153872967 CEST44349739142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.154464006 CEST44349739142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.154525995 CEST49739443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.155488968 CEST44349739142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.155549049 CEST49739443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.166150093 CEST49739443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.166367054 CEST44349739142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.166817904 CEST49739443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.166826963 CEST44349739142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.193852901 CEST44349741142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.213815928 CEST49739443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.214358091 CEST49741443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.214384079 CEST44349741142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.214859009 CEST44349741142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.214931011 CEST49741443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.215470076 CEST44349741142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.215543985 CEST49741443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.217617035 CEST49741443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.217681885 CEST44349741142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.218271017 CEST49741443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.218281031 CEST44349741142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.259928942 CEST49741443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.429831982 CEST44349739142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.430434942 CEST44349739142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.430517912 CEST49739443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.443145990 CEST49739443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.443166971 CEST44349739142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.445395947 CEST49744443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.445453882 CEST44349744142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.445563078 CEST49744443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.448180914 CEST49744443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.448220015 CEST44349744142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.493740082 CEST44349741142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.494524002 CEST44349741142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.494589090 CEST49741443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.496511936 CEST49741443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.496530056 CEST44349741142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.499380112 CEST49745443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.499429941 CEST44349745142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.499783993 CEST49745443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.500792027 CEST49745443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:58.500832081 CEST44349745142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:58.794825077 CEST4434974320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:36:58.794897079 CEST49743443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:36:58.803191900 CEST49743443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:36:58.803210020 CEST4434974320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:36:58.803610086 CEST4434974320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:36:58.850490093 CEST49743443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:36:59.103749990 CEST44349744142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:59.104043007 CEST49744443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:59.104114056 CEST44349744142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:59.104649067 CEST44349744142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:59.104727030 CEST49744443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:59.105648041 CEST44349744142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:59.105706930 CEST49744443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:59.105860949 CEST49744443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:59.105951071 CEST44349744142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:59.106029034 CEST49744443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:59.106054068 CEST44349744142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:59.106091976 CEST49744443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:59.149930954 CEST49744443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:59.149975061 CEST44349744142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:59.152264118 CEST44349745142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:59.152601004 CEST49745443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:59.152637005 CEST44349745142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:59.153167963 CEST44349745142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:59.153235912 CEST49745443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:59.154174089 CEST44349745142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:59.154237032 CEST49745443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:59.154407024 CEST49745443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:59.154514074 CEST44349745142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:59.154874086 CEST49745443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:59.154891968 CEST44349745142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:59.154930115 CEST49745443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:59.196635962 CEST49745443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:59.196667910 CEST44349745142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:59.324450970 CEST44349744142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:59.325311899 CEST44349744142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:59.325489044 CEST49744443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:59.326169968 CEST49744443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:59.326216936 CEST44349744142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:59.374089003 CEST44349745142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:59.374742985 CEST44349745142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:59.374811888 CEST49745443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:59.375521898 CEST49745443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:36:59.375562906 CEST44349745142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:36:59.385978937 CEST49703443192.168.2.523.1.237.91
                                                        Oct 2, 2024 18:36:59.386070013 CEST49703443192.168.2.523.1.237.91
                                                        Oct 2, 2024 18:36:59.386418104 CEST49752443192.168.2.523.1.237.91
                                                        Oct 2, 2024 18:36:59.386468887 CEST4434975223.1.237.91192.168.2.5
                                                        Oct 2, 2024 18:36:59.386548996 CEST49752443192.168.2.523.1.237.91
                                                        Oct 2, 2024 18:36:59.386951923 CEST49752443192.168.2.523.1.237.91
                                                        Oct 2, 2024 18:36:59.386977911 CEST4434975223.1.237.91192.168.2.5
                                                        Oct 2, 2024 18:36:59.392246962 CEST4434970323.1.237.91192.168.2.5
                                                        Oct 2, 2024 18:36:59.392595053 CEST4434970323.1.237.91192.168.2.5
                                                        Oct 2, 2024 18:36:59.525857925 CEST49743443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:36:59.571396112 CEST4434974320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:36:59.780602932 CEST4434974320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:36:59.780627012 CEST4434974320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:36:59.780635118 CEST4434974320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:36:59.780652046 CEST4434974320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:36:59.780695915 CEST49743443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:36:59.780713081 CEST4434974320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:36:59.780766964 CEST4434974320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:36:59.780777931 CEST4434974320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:36:59.780786991 CEST49743443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:36:59.780786991 CEST49743443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:36:59.780828953 CEST49743443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:36:59.781106949 CEST4434974320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:36:59.781162977 CEST4434974320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:36:59.781220913 CEST49743443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:37:00.000785112 CEST4434975223.1.237.91192.168.2.5
                                                        Oct 2, 2024 18:37:00.000863075 CEST49752443192.168.2.523.1.237.91
                                                        Oct 2, 2024 18:37:00.005184889 CEST49718443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:37:00.051402092 CEST44349718142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:37:00.272974968 CEST44349718142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:37:00.273098946 CEST44349718142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:37:00.273158073 CEST49718443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:37:00.273176908 CEST44349718142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:37:00.273269892 CEST44349718142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:37:00.273339033 CEST49718443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:37:00.273344994 CEST44349718142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:37:00.273533106 CEST44349718142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:37:00.273590088 CEST49718443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:37:00.275698900 CEST49718443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:37:00.275710106 CEST44349718142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:37:00.708740950 CEST49743443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:37:00.708765984 CEST4434974320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:37:00.708780050 CEST49743443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:37:00.708787918 CEST4434974320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:37:05.554603100 CEST49759443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:05.554651022 CEST44349759142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:05.554964066 CEST49759443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:05.559997082 CEST49759443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:05.560012102 CEST44349759142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:06.204830885 CEST44349759142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:06.205331087 CEST49759443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:06.205352068 CEST44349759142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:06.206079006 CEST44349759142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:06.206505060 CEST49759443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:06.206589937 CEST44349759142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:06.206741095 CEST49759443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:06.206767082 CEST49759443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:06.206773996 CEST44349759142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:06.533075094 CEST44349759142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:06.533524036 CEST44349759142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:06.533590078 CEST49759443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:06.534796000 CEST49759443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:06.534823895 CEST44349759142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:19.182480097 CEST4434975223.1.237.91192.168.2.5
                                                        Oct 2, 2024 18:37:19.182584047 CEST49752443192.168.2.523.1.237.91
                                                        Oct 2, 2024 18:37:27.576287985 CEST49760443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:27.576333046 CEST44349760142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:27.576401949 CEST49760443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:27.577200890 CEST49760443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:27.577214003 CEST44349760142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:28.120944977 CEST49761443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:28.120992899 CEST44349761142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:28.121107101 CEST49761443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:28.121483088 CEST49761443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:28.121504068 CEST44349761142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:28.267996073 CEST44349760142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:28.268482924 CEST49760443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:28.268512964 CEST44349760142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:28.269010067 CEST44349760142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:28.269319057 CEST49760443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:28.269397974 CEST44349760142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:28.269493103 CEST49760443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:28.269512892 CEST49760443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:28.269521952 CEST44349760142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:28.567408085 CEST44349760142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:28.568126917 CEST44349760142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:28.568247080 CEST49760443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:28.568362951 CEST49760443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:28.568378925 CEST44349760142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:28.745275974 CEST49762443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:28.745304108 CEST44349762142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:28.745400906 CEST49762443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:28.745673895 CEST49762443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:28.745686054 CEST44349762142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:28.774405003 CEST44349761142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:28.774750948 CEST49761443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:28.774760962 CEST44349761142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:28.775291920 CEST44349761142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:28.776495934 CEST49761443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:28.776593924 CEST44349761142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:28.776671886 CEST49761443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:28.776701927 CEST49761443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:28.776706934 CEST44349761142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:29.122596025 CEST44349761142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:29.123322010 CEST44349761142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:29.126363993 CEST49761443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:29.126458883 CEST49761443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:29.126470089 CEST44349761142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:29.419720888 CEST44349762142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:29.420047998 CEST49762443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:29.420103073 CEST44349762142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:29.420629025 CEST44349762142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:29.420950890 CEST49762443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:29.421037912 CEST44349762142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:29.421118975 CEST49762443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:29.421135902 CEST49762443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:29.421150923 CEST44349762142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:29.635931015 CEST44349762142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:29.636957884 CEST44349762142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:29.637012959 CEST49762443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:29.637108088 CEST49762443192.168.2.5142.250.186.78
                                                        Oct 2, 2024 18:37:29.637120962 CEST44349762142.250.186.78192.168.2.5
                                                        Oct 2, 2024 18:37:37.402726889 CEST49763443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:37:37.402755976 CEST4434976320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:37:37.402834892 CEST49763443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:37:37.403224945 CEST49763443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:37:37.403235912 CEST4434976320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:37:38.247307062 CEST4434976320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:37:38.247450113 CEST49763443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:37:38.253299952 CEST49763443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:37:38.253319979 CEST4434976320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:37:38.253889084 CEST4434976320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:37:38.263730049 CEST49763443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:37:38.307403088 CEST4434976320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:37:38.589257956 CEST4434976320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:37:38.589319944 CEST4434976320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:37:38.589365005 CEST4434976320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:37:38.589437962 CEST49763443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:37:38.589469910 CEST4434976320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:37:38.589525938 CEST49763443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:37:38.590665102 CEST4434976320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:37:38.590709925 CEST49763443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:37:38.590715885 CEST4434976320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:37:38.590743065 CEST49763443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:37:38.590790987 CEST49763443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:37:38.590796947 CEST4434976320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:37:38.590868950 CEST4434976320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:37:38.590914011 CEST49763443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:37:38.594196081 CEST49763443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:37:38.594228029 CEST4434976320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:37:38.594239950 CEST49763443192.168.2.520.114.59.183
                                                        Oct 2, 2024 18:37:38.594247103 CEST4434976320.114.59.183192.168.2.5
                                                        Oct 2, 2024 18:37:51.112601995 CEST49765443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:37:51.112622976 CEST44349765142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:37:51.112994909 CEST49765443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:37:51.112994909 CEST49765443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:37:51.113051891 CEST44349765142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:37:51.798676014 CEST44349765142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:37:51.799093962 CEST49765443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:37:51.799107075 CEST44349765142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:37:51.799452066 CEST44349765142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:37:51.799772978 CEST49765443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:37:51.799838066 CEST44349765142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:37:51.845048904 CEST49765443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:37:59.974648952 CEST49768443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:37:59.974708080 CEST44349768216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:37:59.974787951 CEST49768443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:37:59.975019932 CEST49768443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:37:59.975040913 CEST44349768216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:00.074695110 CEST49769443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:00.074757099 CEST44349769216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:00.074839115 CEST49769443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:00.075149059 CEST49769443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:00.075164080 CEST44349769216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:00.611499071 CEST44349768216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:00.666711092 CEST49768443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:00.692215919 CEST49768443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:00.692249060 CEST44349768216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:00.692840099 CEST44349768216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:00.693253040 CEST49768443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:00.693325996 CEST44349768216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:00.693468094 CEST49768443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:00.693468094 CEST49768443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:00.693494081 CEST44349768216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:00.722959042 CEST44349769216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:00.725112915 CEST49769443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:00.725131035 CEST44349769216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:00.725573063 CEST44349769216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:00.726066113 CEST49769443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:00.726140022 CEST44349769216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:00.727801085 CEST49769443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:00.727827072 CEST49769443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:00.727838993 CEST44349769216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:00.914253950 CEST44349768216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:00.914546013 CEST44349768216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:00.914606094 CEST49768443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:00.915081978 CEST49768443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:00.915108919 CEST44349768216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:01.028172016 CEST44349769216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:01.029495001 CEST44349769216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:01.029566050 CEST49769443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:01.029990911 CEST49769443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:01.030008078 CEST44349769216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:01.705737114 CEST44349765142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:38:01.705882072 CEST44349765142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:38:01.705950022 CEST49765443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:38:31.748825073 CEST49765443192.168.2.5142.250.185.68
                                                        Oct 2, 2024 18:38:31.748868942 CEST44349765142.250.185.68192.168.2.5
                                                        Oct 2, 2024 18:38:31.749109983 CEST49772443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:31.749171019 CEST44349772216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:31.749277115 CEST49772443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:31.749897003 CEST49772443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:31.749917984 CEST44349772216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:31.794496059 CEST49773443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:31.794550896 CEST44349773216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:31.794615030 CEST49773443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:31.794966936 CEST49773443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:31.794991016 CEST44349773216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:32.394289017 CEST44349772216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:32.394695044 CEST49772443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:32.394731045 CEST44349772216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:32.395231009 CEST44349772216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:32.395543098 CEST49772443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:32.395622015 CEST44349772216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:32.395695925 CEST49772443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:32.395709991 CEST49772443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:32.395724058 CEST44349772216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:32.516434908 CEST44349773216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:32.516833067 CEST49773443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:32.516849995 CEST44349773216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:32.517565966 CEST44349773216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:32.517877102 CEST49773443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:32.517962933 CEST44349773216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:32.518044949 CEST49773443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:32.518058062 CEST49773443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:32.518071890 CEST44349773216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:32.630955935 CEST44349772216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:32.631930113 CEST44349772216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:32.631992102 CEST49772443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:32.632086039 CEST49772443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:32.632102966 CEST44349772216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:32.816158056 CEST44349773216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:32.817117929 CEST44349773216.58.206.78192.168.2.5
                                                        Oct 2, 2024 18:38:32.817188978 CEST49773443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:32.817485094 CEST49773443192.168.2.5216.58.206.78
                                                        Oct 2, 2024 18:38:32.817497015 CEST44349773216.58.206.78192.168.2.5
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Oct 2, 2024 18:36:46.536828041 CEST53509401.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:36:46.572778940 CEST5708153192.168.2.51.1.1.1
                                                        Oct 2, 2024 18:36:46.573143959 CEST4996753192.168.2.51.1.1.1
                                                        Oct 2, 2024 18:36:46.581243038 CEST53499671.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:36:46.581330061 CEST53557621.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:36:46.581943989 CEST53570811.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:36:47.639637947 CEST6081753192.168.2.51.1.1.1
                                                        Oct 2, 2024 18:36:47.639637947 CEST6544753192.168.2.51.1.1.1
                                                        Oct 2, 2024 18:36:47.646502972 CEST53654471.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:36:47.647435904 CEST53608171.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:36:47.662753105 CEST53511821.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:36:48.700221062 CEST53607471.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:36:51.091181040 CEST6434453192.168.2.51.1.1.1
                                                        Oct 2, 2024 18:36:51.091365099 CEST5663753192.168.2.51.1.1.1
                                                        Oct 2, 2024 18:36:51.098382950 CEST53566371.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:36:51.098412037 CEST53643441.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:36:51.303183079 CEST53642881.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:36:53.574739933 CEST53574521.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:36:56.436717987 CEST6123453192.168.2.51.1.1.1
                                                        Oct 2, 2024 18:36:56.436969995 CEST5572153192.168.2.51.1.1.1
                                                        Oct 2, 2024 18:36:56.443506956 CEST53612341.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:36:56.444127083 CEST53557211.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:36:57.467953920 CEST5074353192.168.2.51.1.1.1
                                                        Oct 2, 2024 18:36:57.468137980 CEST6276153192.168.2.51.1.1.1
                                                        Oct 2, 2024 18:36:57.475100040 CEST53627611.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:36:57.475218058 CEST53507431.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:37:46.350601912 CEST53645661.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:37:58.544018030 CEST53510601.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:37:59.966403008 CEST5617353192.168.2.51.1.1.1
                                                        Oct 2, 2024 18:37:59.966562986 CEST6350653192.168.2.51.1.1.1
                                                        Oct 2, 2024 18:37:59.974106073 CEST53561731.1.1.1192.168.2.5
                                                        Oct 2, 2024 18:37:59.974117994 CEST53635061.1.1.1192.168.2.5
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Oct 2, 2024 18:36:46.572778940 CEST192.168.2.51.1.1.10x8320Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:46.573143959 CEST192.168.2.51.1.1.10x665aStandard query (0)youtube.com65IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.639637947 CEST192.168.2.51.1.1.10xde3cStandard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.639637947 CEST192.168.2.51.1.1.10x4c4eStandard query (0)www.youtube.com65IN (0x0001)false
                                                        Oct 2, 2024 18:36:51.091181040 CEST192.168.2.51.1.1.10xa452Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:51.091365099 CEST192.168.2.51.1.1.10xf9bStandard query (0)www.google.com65IN (0x0001)false
                                                        Oct 2, 2024 18:36:56.436717987 CEST192.168.2.51.1.1.10xec3cStandard query (0)accounts.youtube.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:56.436969995 CEST192.168.2.51.1.1.10xf25fStandard query (0)accounts.youtube.com65IN (0x0001)false
                                                        Oct 2, 2024 18:36:57.467953920 CEST192.168.2.51.1.1.10xca98Standard query (0)play.google.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:57.468137980 CEST192.168.2.51.1.1.10x5ecStandard query (0)play.google.com65IN (0x0001)false
                                                        Oct 2, 2024 18:37:59.966403008 CEST192.168.2.51.1.1.10x3ee2Standard query (0)play.google.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:37:59.966562986 CEST192.168.2.51.1.1.10x49fStandard query (0)play.google.com65IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Oct 2, 2024 18:36:46.581243038 CEST1.1.1.1192.168.2.50x665aNo error (0)youtube.com65IN (0x0001)false
                                                        Oct 2, 2024 18:36:46.581943989 CEST1.1.1.1192.168.2.50x8320No error (0)youtube.com142.250.184.238A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.646502972 CEST1.1.1.1192.168.2.50x4c4eNo error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.646502972 CEST1.1.1.1192.168.2.50x4c4eNo error (0)youtube-ui.l.google.com65IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.647435904 CEST1.1.1.1192.168.2.50xde3cNo error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.647435904 CEST1.1.1.1192.168.2.50xde3cNo error (0)youtube-ui.l.google.com216.58.212.174A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.647435904 CEST1.1.1.1192.168.2.50xde3cNo error (0)youtube-ui.l.google.com142.250.74.206A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.647435904 CEST1.1.1.1192.168.2.50xde3cNo error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.647435904 CEST1.1.1.1192.168.2.50xde3cNo error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.647435904 CEST1.1.1.1192.168.2.50xde3cNo error (0)youtube-ui.l.google.com216.58.212.142A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.647435904 CEST1.1.1.1192.168.2.50xde3cNo error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.647435904 CEST1.1.1.1192.168.2.50xde3cNo error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.647435904 CEST1.1.1.1192.168.2.50xde3cNo error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.647435904 CEST1.1.1.1192.168.2.50xde3cNo error (0)youtube-ui.l.google.com172.217.23.110A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.647435904 CEST1.1.1.1192.168.2.50xde3cNo error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.647435904 CEST1.1.1.1192.168.2.50xde3cNo error (0)youtube-ui.l.google.com172.217.16.142A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.647435904 CEST1.1.1.1192.168.2.50xde3cNo error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.647435904 CEST1.1.1.1192.168.2.50xde3cNo error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.647435904 CEST1.1.1.1192.168.2.50xde3cNo error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.647435904 CEST1.1.1.1192.168.2.50xde3cNo error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:47.647435904 CEST1.1.1.1192.168.2.50xde3cNo error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:51.098382950 CEST1.1.1.1192.168.2.50xf9bNo error (0)www.google.com65IN (0x0001)false
                                                        Oct 2, 2024 18:36:51.098412037 CEST1.1.1.1192.168.2.50xa452No error (0)www.google.com142.250.185.68A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:56.443506956 CEST1.1.1.1192.168.2.50xec3cNo error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 2, 2024 18:36:56.443506956 CEST1.1.1.1192.168.2.50xec3cNo error (0)www3.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:36:56.444127083 CEST1.1.1.1192.168.2.50xf25fNo error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 2, 2024 18:36:57.475218058 CEST1.1.1.1192.168.2.50xca98No error (0)play.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 18:37:59.974106073 CEST1.1.1.1192.168.2.50x3ee2No error (0)play.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                        • youtube.com
                                                        • www.youtube.com
                                                        • fs.microsoft.com
                                                        • https:
                                                          • accounts.youtube.com
                                                          • play.google.com
                                                          • www.google.com
                                                        • slscr.update.microsoft.com
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.549706142.250.184.2384437656C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 16:36:47 UTC859OUTGET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1
                                                        Host: youtube.com
                                                        Connection: keep-alive
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Upgrade-Insecure-Requests: 1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                                        Sec-Fetch-Site: none
                                                        Sec-Fetch-Mode: navigate
                                                        Sec-Fetch-User: ?1
                                                        Sec-Fetch-Dest: document
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 16:36:47 UTC1704INHTTP/1.1 301 Moved Permanently
                                                        Content-Type: application/binary
                                                        X-Content-Type-Options: nosniff
                                                        Expires: Wed, 02 Oct 2024 16:36:47 GMT
                                                        Date: Wed, 02 Oct 2024 16:36:47 GMT
                                                        Cache-Control: private, max-age=31536000
                                                        Location: https://www.youtube.com/account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd
                                                        X-Frame-Options: SAMEORIGIN
                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                        Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                                                        Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                                                        Content-Security-Policy: require-trusted-types-for 'script'
                                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                        Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Server: ESF
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.549711216.58.212.1744437656C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 16:36:48 UTC877OUTGET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1
                                                        Host: www.youtube.com
                                                        Connection: keep-alive
                                                        Upgrade-Insecure-Requests: 1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                                        Sec-Fetch-Site: none
                                                        Sec-Fetch-Mode: navigate
                                                        Sec-Fetch-User: ?1
                                                        Sec-Fetch-Dest: document
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 16:36:48 UTC2634INHTTP/1.1 303 See Other
                                                        Content-Type: application/binary
                                                        X-Content-Type-Options: nosniff
                                                        Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                        Pragma: no-cache
                                                        Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                        Date: Wed, 02 Oct 2024 16:36:48 GMT
                                                        Location: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%253F%253Dhttps%25253A%25252F%25252Faccounts.google.com%25252Fv3%25252Fsignin%25252Fchallenge%25252Fpwd%26feature%3Dredirect_login&hl=en
                                                        X-Frame-Options: SAMEORIGIN
                                                        Strict-Transport-Security: max-age=31536000
                                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                        Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                                                        Content-Security-Policy: require-trusted-types-for 'script'
                                                        Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                                                        Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        P3P: CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657?hl=en for more info."
                                                        Server: ESF
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        Set-Cookie: GPS=1; Domain=.youtube.com; Expires=Wed, 02-Oct-2024 17:06:48 GMT; Path=/; Secure; HttpOnly
                                                        Set-Cookie: YSC=jgKumrnDRkM; Domain=.youtube.com; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                        Set-Cookie: VISITOR_INFO1_LIVE=wAZg932n_Is; Domain=.youtube.com; Expires=Mon, 31-Mar-2025 16:36:48 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                        Set-Cookie: VISITOR_PRIVACY_METADATA=CgJVUxIEGgAgZw%3D%3D; Domain=.youtube.com; Expires=Mon, 31-Mar-2025 16:36:48 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.549719184.28.90.27443
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 16:36:52 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        Accept-Encoding: identity
                                                        User-Agent: Microsoft BITS/7.8
                                                        Host: fs.microsoft.com
                                                        2024-10-02 16:36:52 UTC466INHTTP/1.1 200 OK
                                                        Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                        Content-Type: application/octet-stream
                                                        ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                        Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                        Server: ECAcc (lpl/EF06)
                                                        X-CID: 11
                                                        X-Ms-ApiVersion: Distribute 1.2
                                                        X-Ms-Region: prod-neu-z1
                                                        Cache-Control: public, max-age=86938
                                                        Date: Wed, 02 Oct 2024 16:36:52 GMT
                                                        Connection: close
                                                        X-CID: 2


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.549724184.28.90.27443
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 16:36:53 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        Accept-Encoding: identity
                                                        If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                                                        Range: bytes=0-2147483646
                                                        User-Agent: Microsoft BITS/7.8
                                                        Host: fs.microsoft.com
                                                        2024-10-02 16:36:53 UTC514INHTTP/1.1 200 OK
                                                        ApiVersion: Distribute 1.1
                                                        Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                        Content-Type: application/octet-stream
                                                        ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                        Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                        Server: ECAcc (lpl/EF06)
                                                        X-CID: 11
                                                        X-Ms-ApiVersion: Distribute 1.2
                                                        X-Ms-Region: prod-weu-z1
                                                        Cache-Control: public, max-age=86881
                                                        Date: Wed, 02 Oct 2024 16:36:53 GMT
                                                        Content-Length: 55
                                                        Connection: close
                                                        X-CID: 2
                                                        2024-10-02 16:36:53 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                                                        Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.549736142.250.185.1424437656C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 16:36:57 UTC1223OUTGET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=444455916&timestamp=1727887015863 HTTP/1.1
                                                        Host: accounts.youtube.com
                                                        Connection: keep-alive
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-platform: "Windows"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        Upgrade-Insecure-Requests: 1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                                        Sec-Fetch-Site: cross-site
                                                        Sec-Fetch-Mode: navigate
                                                        Sec-Fetch-Dest: iframe
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 16:36:57 UTC1969INHTTP/1.1 200 OK
                                                        Content-Type: text/html; charset=utf-8
                                                        X-Frame-Options: ALLOW-FROM https://accounts.google.com
                                                        Content-Security-Policy: frame-ancestors https://accounts.google.com
                                                        Content-Security-Policy: script-src 'report-sample' 'nonce-qRHcDpl1OcDUOWmUxqIl4Q' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport;worker-src 'self'
                                                        Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport/allowlist
                                                        Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport
                                                        Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                        Pragma: no-cache
                                                        Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                        Date: Wed, 02 Oct 2024 16:36:57 GMT
                                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                        Cross-Origin-Opener-Policy: same-origin
                                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        reporting-endpoints: default="/_/AccountsDomainCookiesCheckConnectionHttp/web-reports?context=eJzjstDikmLw0ZBikPj6kkkDiJ3SZ7AGAXHSv_OsRUB8ufsS63UgVu25xGoKxEUSV1ibgFiIh2Pl26_b2QQ6trRPZVTSS8ovjM9MSc0rySypTMnPTczMS87Pz85MLS5OLSpLLYo3MjAyMbA0MtIzsIgvMAAA14ItTg"
                                                        Server: ESF
                                                        X-XSS-Protection: 0
                                                        X-Content-Type-Options: nosniff
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 16:36:57 UTC1969INData Raw: 37 36 31 39 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 20 6e 6f 6e 63 65 3d 22 71 52 48 63 44 70 6c 31 4f 63 44 55 4f 57 6d 55 78 71 49 6c 34 51 22 3e 22 75 73 65 20 73 74 72 69 63 74 22 3b 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 3d 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 7c 7c 7b 7d 3b 28 66 75 6e 63 74 69 6f 6e 28 5f 29 7b 76 61 72 20 77 69 6e 64 6f 77 3d 74 68 69 73 3b 0a 74 72 79 7b 0a 5f 2e 5f 46 5f 74 6f 67 67 6c 65 73 5f 69 6e 69 74 69 61 6c 69 7a 65 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 28 74 79 70 65 6f
                                                        Data Ascii: 7619<html><head><script nonce="qRHcDpl1OcDUOWmUxqIl4Q">"use strict";this.default_AccountsDomaincookiesCheckconnectionJs=this.default_AccountsDomaincookiesCheckconnectionJs||{};(function(_){var window=this;try{_._F_toggles_initialize=function(a){(typeo
                                                        2024-10-02 16:36:57 UTC1969INData Raw: 54 72 69 64 65 6e 74 5c 2f 28 5c 64 2e 5c 64 29 2f 2e 65 78 65 63 28 62 29 2c 0a 63 5b 31 5d 3d 3d 22 37 2e 30 22 29 69 66 28 62 26 26 62 5b 31 5d 29 73 77 69 74 63 68 28 62 5b 31 5d 29 7b 63 61 73 65 20 22 34 2e 30 22 3a 61 3d 22 38 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 35 2e 30 22 3a 61 3d 22 39 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 36 2e 30 22 3a 61 3d 22 31 30 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 37 2e 30 22 3a 61 3d 22 31 31 2e 30 22 7d 65 6c 73 65 20 61 3d 22 37 2e 30 22 3b 65 6c 73 65 20 61 3d 63 5b 31 5d 3b 62 3d 61 7d 65 6c 73 65 20 62 3d 22 22 3b 72 65 74 75 72 6e 20 62 7d 76 61 72 20 64 3d 52 65 67 45 78 70 28 22 28 5b 41 2d 5a 5d 5b 5c 5c 77 20 5d 2b 29 2f 28 5b 5e 5c 5c 73 5d 2b 29 5c 5c 73 2a 28 3f 3a 5c 5c 28
                                                        Data Ascii: Trident\/(\d.\d)/.exec(b),c[1]=="7.0")if(b&&b[1])switch(b[1]){case "4.0":a="8.0";break;case "5.0":a="9.0";break;case "6.0":a="10.0";break;case "7.0":a="11.0"}else a="7.0";else a=c[1];b=a}else b="";return b}var d=RegExp("([A-Z][\\w ]+)/([^\\s]+)\\s*(?:\\(
                                                        2024-10-02 16:36:57 UTC1969INData Raw: 74 63 68 28 74 79 70 65 6f 66 20 61 29 7b 63 61 73 65 20 22 6e 75 6d 62 65 72 22 3a 72 65 74 75 72 6e 20 69 73 46 69 6e 69 74 65 28 61 29 3f 61 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 69 67 69 6e 74 22 3a 72 65 74 75 72 6e 28 41 61 3f 0a 61 3e 3d 42 61 26 26 61 3c 3d 43 61 3a 61 5b 30 5d 3d 3d 3d 22 2d 22 3f 75 61 28 61 2c 44 61 29 3a 75 61 28 61 2c 45 61 29 29 3f 4e 75 6d 62 65 72 28 61 29 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 72 65 74 75 72 6e 20 61 3f 31 3a 30 3b 63 61 73 65 20 22 6f 62 6a 65 63 74 22 3a 69 66 28 61 29 69 66 28 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 61 29 29 7b 69 66 28 43 28 61 29 29 72 65 74 75 72 6e 7d 65 6c 73 65 20 69 66 28 46 61 26 26 61 21 3d 6e 75 6c 6c 26 26 61 20 69 6e
                                                        Data Ascii: tch(typeof a){case "number":return isFinite(a)?a:String(a);case "bigint":return(Aa?a>=Ba&&a<=Ca:a[0]==="-"?ua(a,Da):ua(a,Ea))?Number(a):String(a);case "boolean":return a?1:0;case "object":if(a)if(Array.isArray(a)){if(C(a))return}else if(Fa&&a!=null&&a in
                                                        2024-10-02 16:36:57 UTC1969INData Raw: 7b 76 61 72 20 62 3b 69 66 28 61 26 26 28 62 3d 51 61 29 21 3d 6e 75 6c 6c 26 26 62 2e 68 61 73 28 61 29 26 26 28 62 3d 61 2e 43 29 29 66 6f 72 28 76 61 72 20 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 62 5b 63 5d 3b 69 66 28 63 3d 3d 3d 62 2e 6c 65 6e 67 74 68 2d 31 26 26 41 28 64 29 29 66 6f 72 28 76 61 72 20 65 20 69 6e 20 64 29 7b 76 61 72 20 66 3d 64 5b 65 5d 3b 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 66 29 26 26 0a 52 61 28 66 2c 61 29 7d 65 6c 73 65 20 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 64 29 26 26 52 61 28 64 2c 61 29 7d 61 3d 45 3f 61 2e 43 3a 4d 61 28 61 2e 43 2c 50 61 2c 76 6f 69 64 20 30 2c 76 6f 69 64 20 30 2c 21 31 29 3b 65 3d 21 45 3b 69 66 28 62 3d 61 2e 6c 65 6e 67 74 68 29 7b 64 3d 61 5b 62 2d
                                                        Data Ascii: {var b;if(a&&(b=Qa)!=null&&b.has(a)&&(b=a.C))for(var c=0;c<b.length;c++){var d=b[c];if(c===b.length-1&&A(d))for(var e in d){var f=d[e];Array.isArray(f)&&Ra(f,a)}else Array.isArray(d)&&Ra(d,a)}a=E?a.C:Ma(a.C,Pa,void 0,void 0,!1);e=!E;if(b=a.length){d=a[b-
                                                        2024-10-02 16:36:57 UTC1969INData Raw: 6f 6c 2e 69 74 65 72 61 74 6f 72 22 2c 66 75 6e 63 74 69 6f 6e 28 61 29 7b 69 66 28 61 29 72 65 74 75 72 6e 20 61 3b 61 3d 53 79 6d 62 6f 6c 28 22 63 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 22 41 72 72 61 79 20 49 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 43 6c 61 6d 70 65 64 41 72 72 61 79 20 49 6e 74 31 36 41 72 72 61 79 20 55 69 6e 74 31 36 41 72 72 61 79 20 49 6e 74 33 32 41 72 72 61 79 20 55 69 6e 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 36 34 41 72 72 61 79 22 2e 73 70 6c 69 74 28 22 20 22 29 2c 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 57 61 5b 62 5b 63 5d 5d 3b 74 79 70 65 6f 66 20 64 3d 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 26 26 74 79 70 65
                                                        Data Ascii: ol.iterator",function(a){if(a)return a;a=Symbol("c");for(var b="Array Int8Array Uint8Array Uint8ClampedArray Int16Array Uint16Array Int32Array Uint32Array Float32Array Float64Array".split(" "),c=0;c<b.length;c++){var d=Wa[b[c]];typeof d==="function"&&type
                                                        2024-10-02 16:36:57 UTC1969INData Raw: 29 3b 65 28 22 66 72 65 65 7a 65 22 29 3b 65 28 22 70 72 65 76 65 6e 74 45 78 74 65 6e 73 69 6f 6e 73 22 29 3b 65 28 22 73 65 61 6c 22 29 3b 76 61 72 20 68 3d 30 2c 67 3d 66 75 6e 63 74 69 6f 6e 28 6b 29 7b 74 68 69 73 2e 67 3d 28 68 2b 3d 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2b 31 29 2e 74 6f 53 74 72 69 6e 67 28 29 3b 69 66 28 6b 29 7b 6b 3d 48 28 6b 29 3b 66 6f 72 28 76 61 72 20 6c 3b 21 28 6c 3d 6b 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6c 3d 6c 2e 76 61 6c 75 65 2c 74 68 69 73 2e 73 65 74 28 6c 5b 30 5d 2c 6c 5b 31 5d 29 7d 7d 3b 67 2e 70 72 6f 74 6f 74 79 70 65 2e 73 65 74 3d 66 75 6e 63 74 69 6f 6e 28 6b 2c 6c 29 7b 69 66 28 21 63 28 6b 29 29 74 68 72 6f 77 20 45 72 72 6f 72 28 22 69 22 29 3b 64 28 6b 29 3b 69 66 28 21 49 28 6b 2c 66 29 29
                                                        Data Ascii: );e("freeze");e("preventExtensions");e("seal");var h=0,g=function(k){this.g=(h+=Math.random()+1).toString();if(k){k=H(k);for(var l;!(l=k.next()).done;)l=l.value,this.set(l[0],l[1])}};g.prototype.set=function(k,l){if(!c(k))throw Error("i");d(k);if(!I(k,f))
                                                        2024-10-02 16:36:57 UTC1969INData Raw: 75 72 6e 20 67 2e 76 61 6c 75 65 7d 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 2e 66 6f 72 45 61 63 68 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 66 6f 72 28 76 61 72 20 6c 3d 74 68 69 73 2e 65 6e 74 72 69 65 73 28 29 2c 6d 3b 21 28 6d 3d 6c 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6d 3d 0a 6d 2e 76 61 6c 75 65 2c 67 2e 63 61 6c 6c 28 6b 2c 6d 5b 31 5d 2c 6d 5b 30 5d 2c 74 68 69 73 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 5b 53 79 6d 62 6f 6c 2e 69 74 65 72 61 74 6f 72 5d 3d 63 2e 70 72 6f 74 6f 74 79 70 65 2e 65 6e 74 72 69 65 73 3b 76 61 72 20 64 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 76 61 72 20 6c 3d 6b 26 26 74 79 70 65 6f 66 20 6b 3b 6c 3d 3d 22 6f 62 6a 65 63 74 22 7c 7c 6c 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 3f 62 2e 68 61 73 28 6b 29
                                                        Data Ascii: urn g.value})};c.prototype.forEach=function(g,k){for(var l=this.entries(),m;!(m=l.next()).done;)m=m.value,g.call(k,m[1],m[0],this)};c.prototype[Symbol.iterator]=c.prototype.entries;var d=function(g,k){var l=k&&typeof k;l=="object"||l=="function"?b.has(k)
                                                        2024-10-02 16:36:57 UTC1969INData Raw: 6f 6e 28 61 29 7b 72 65 74 75 72 6e 20 61 3f 61 3a 66 75 6e 63 74 69 6f 6e 28 62 29 7b 72 65 74 75 72 6e 20 74 79 70 65 6f 66 20 62 3d 3d 3d 22 6e 75 6d 62 65 72 22 26 26 69 73 4e 61 4e 28 62 29 7d 7d 29 3b 76 61 72 20 66 62 3d 66 62 7c 7c 7b 7d 2c 71 3d 74 68 69 73 7c 7c 73 65 6c 66 2c 67 62 3d 71 2e 5f 46 5f 74 6f 67 67 6c 65 73 7c 7c 5b 5d 2c 68 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 61 3d 61 2e 73 70 6c 69 74 28 22 2e 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 71 2c 63 3d 30 3b 63 3c 61 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 69 66 28 62 3d 62 5b 61 5b 63 5d 5d 2c 62 3d 3d 6e 75 6c 6c 29 72 65 74 75 72 6e 20 6e 75 6c 6c 3b 72 65 74 75 72 6e 20 62 7d 2c 69 62 3d 22 63 6c 6f 73 75 72 65 5f 75 69 64 5f 22 2b 28 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2a 31 45
                                                        Data Ascii: on(a){return a?a:function(b){return typeof b==="number"&&isNaN(b)}});var fb=fb||{},q=this||self,gb=q._F_toggles||[],hb=function(a){a=a.split(".");for(var b=q,c=0;c<a.length;c++)if(b=b[a[c]],b==null)return null;return b},ib="closure_uid_"+(Math.random()*1E
                                                        2024-10-02 16:36:57 UTC1969INData Raw: 74 65 78 74 5f 5f 39 38 34 33 38 32 3d 7b 7d 29 3b 61 2e 5f 5f 63 6c 6f 73 75 72 65 5f 5f 65 72 72 6f 72 5f 5f 63 6f 6e 74 65 78 74 5f 5f 39 38 34 33 38 32 2e 73 65 76 65 72 69 74 79 3d 62 7d 3b 76 61 72 20 71 62 3d 66 75 6e 63 74 69 6f 6e 28 61 2c 62 2c 63 29 7b 63 3d 63 7c 7c 71 3b 76 61 72 20 64 3d 63 2e 6f 6e 65 72 72 6f 72 2c 65 3d 21 21 62 3b 63 2e 6f 6e 65 72 72 6f 72 3d 66 75 6e 63 74 69 6f 6e 28 66 2c 68 2c 67 2c 6b 2c 6c 29 7b 64 26 26 64 28 66 2c 68 2c 67 2c 6b 2c 6c 29 3b 61 28 7b 6d 65 73 73 61 67 65 3a 66 2c 66 69 6c 65 4e 61 6d 65 3a 68 2c 6c 69 6e 65 3a 67 2c 6c 69 6e 65 4e 75 6d 62 65 72 3a 67 2c 63 61 3a 6b 2c 65 72 72 6f 72 3a 6c 7d 29 3b 72 65 74 75 72 6e 20 65 7d 7d 2c 74 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 76 61 72 20 62 3d 68
                                                        Data Ascii: text__984382={});a.__closure__error__context__984382.severity=b};var qb=function(a,b,c){c=c||q;var d=c.onerror,e=!!b;c.onerror=function(f,h,g,k,l){d&&d(f,h,g,k,l);a({message:f,fileName:h,line:g,lineNumber:g,ca:k,error:l});return e}},tb=function(a){var b=h
                                                        2024-10-02 16:36:57 UTC1969INData Raw: 22 6e 75 6d 62 65 72 22 3a 66 3d 53 74 72 69 6e 67 28 66 29 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 66 3d 66 3f 22 74 72 75 65 22 3a 22 66 61 6c 73 65 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 66 75 6e 63 74 69 6f 6e 22 3a 66 3d 28 66 3d 73 62 28 66 29 29 3f 66 3a 22 5b 66 6e 5d 22 3b 62 72 65 61 6b 3b 64 65 66 61 75 6c 74 3a 66 3d 0a 74 79 70 65 6f 66 20 66 7d 66 2e 6c 65 6e 67 74 68 3e 34 30 26 26 28 66 3d 66 2e 73 6c 69 63 65 28 30 2c 34 30 29 2b 22 2e 2e 2e 22 29 3b 63 2e 70 75 73 68 28 66 29 7d 62 2e 70 75 73 68 28 61 29 3b 63 2e 70 75 73 68 28 22 29 5c 6e 22 29 3b 74 72 79 7b 63 2e 70 75 73 68 28 77 62 28 61 2e 63 61 6c 6c 65 72 2c 62 29 29 7d 63 61 74 63 68 28 68 29 7b 63 2e 70 75 73 68 28 22 5b 65 78 63 65 70 74 69 6f 6e
                                                        Data Ascii: "number":f=String(f);break;case "boolean":f=f?"true":"false";break;case "function":f=(f=sb(f))?f:"[fn]";break;default:f=typeof f}f.length>40&&(f=f.slice(0,40)+"...");c.push(f)}b.push(a);c.push(")\n");try{c.push(wb(a.caller,b))}catch(h){c.push("[exception


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.549739142.250.186.784437656C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 16:36:58 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Accept: */*
                                                        Access-Control-Request-Method: POST
                                                        Access-Control-Request-Headers: x-goog-authuser
                                                        Origin: https://accounts.google.com
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 16:36:58 UTC520INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                        Access-Control-Max-Age: 86400
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 16:36:58 GMT
                                                        Server: Playlog
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.549741142.250.186.784437656C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 16:36:58 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Accept: */*
                                                        Access-Control-Request-Method: POST
                                                        Access-Control-Request-Headers: x-goog-authuser
                                                        Origin: https://accounts.google.com
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 16:36:58 UTC520INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                        Access-Control-Max-Age: 86400
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 16:36:58 GMT
                                                        Server: Playlog
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.549744142.250.186.784437656C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 16:36:59 UTC1132OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 518
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 16:36:59 UTC518OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 37 30 31 36 38 37 35 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727887016875",null,null,null
                                                        2024-10-02 16:36:59 UTC932INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=lmkakIbXXPmx27tGL2C-ZXrxH2TrnfvyRIXC1xI-BglQQG0vwD5T5PXFRxsL-k_5N32mLRUoxFCj87T3SVINlIXTGFcVrD69pNc7ImDdalOt1alkGG20EH29LKTnzKLcUK3lEiF_KBfCnD6FJpP71drk7A3gv1AsNoTIXrAoPIoYqG0kew; expires=Thu, 03-Apr-2025 16:36:59 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 16:36:59 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Wed, 02 Oct 2024 16:36:59 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 16:36:59 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 16:36:59 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        8192.168.2.549745142.250.186.784437656C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 16:36:59 UTC1132OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 519
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 16:36:59 UTC519OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 37 30 31 36 39 36 36 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727887016966",null,null,null
                                                        2024-10-02 16:36:59 UTC933INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=YwyE3uF8hFD0dX8-X0hCAKvfxdZzDD1p1lFqiWJ0jR9oI9lhIAZ5zHrbnvsnOdyukmck4Ki6PSUyqUvQdpH1qOp8W5aF_2Il_n_TQp4jiJkZPt8NVi7zWLcIfps0qHSSM8Y9abnWKUnKwUBdHrkPP0aPgrTjWdGO32CrqNkG5zAT35JI4rE; expires=Thu, 03-Apr-2025 16:36:59 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 16:36:59 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Wed, 02 Oct 2024 16:36:59 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 16:36:59 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 16:36:59 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        9192.168.2.54974320.114.59.183443
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 16:36:59 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=aHerFlXCZkv5WmU&MD=KPHoKgds HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                        Host: slscr.update.microsoft.com
                                                        2024-10-02 16:36:59 UTC560INHTTP/1.1 200 OK
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Content-Type: application/octet-stream
                                                        Expires: -1
                                                        Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                        ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                                                        MS-CorrelationId: ab0b70ca-4b39-421d-a7ce-364b4f507529
                                                        MS-RequestId: e32a67c2-8834-4c65-b744-fc7f77e36151
                                                        MS-CV: 2W0fcNi6WU6YsSRs.0
                                                        X-Microsoft-SLSClientCache: 2880
                                                        Content-Disposition: attachment; filename=environment.cab
                                                        X-Content-Type-Options: nosniff
                                                        Date: Wed, 02 Oct 2024 16:36:59 GMT
                                                        Connection: close
                                                        Content-Length: 24490
                                                        2024-10-02 16:36:59 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                                                        Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                                                        2024-10-02 16:36:59 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                                                        Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        10192.168.2.549718142.250.185.684437656C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 16:37:00 UTC1222OUTGET /favicon.ico HTTP/1.1
                                                        Host: www.google.com
                                                        Connection: keep-alive
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                                                        X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: no-cors
                                                        Sec-Fetch-Dest: image
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=YwyE3uF8hFD0dX8-X0hCAKvfxdZzDD1p1lFqiWJ0jR9oI9lhIAZ5zHrbnvsnOdyukmck4Ki6PSUyqUvQdpH1qOp8W5aF_2Il_n_TQp4jiJkZPt8NVi7zWLcIfps0qHSSM8Y9abnWKUnKwUBdHrkPP0aPgrTjWdGO32CrqNkG5zAT35JI4rE
                                                        2024-10-02 16:37:00 UTC706INHTTP/1.1 200 OK
                                                        Accept-Ranges: bytes
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to="static-on-bigtable"
                                                        Report-To: {"group":"static-on-bigtable","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/static-on-bigtable"}]}
                                                        Content-Length: 5430
                                                        X-Content-Type-Options: nosniff
                                                        Server: sffe
                                                        X-XSS-Protection: 0
                                                        Date: Wed, 02 Oct 2024 13:38:50 GMT
                                                        Expires: Thu, 10 Oct 2024 13:38:50 GMT
                                                        Cache-Control: public, max-age=691200
                                                        Last-Modified: Tue, 22 Oct 2019 18:30:00 GMT
                                                        Content-Type: image/x-icon
                                                        Vary: Accept-Encoding
                                                        Age: 10690
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close
                                                        2024-10-02 16:37:00 UTC684INData Raw: 00 00 01 00 02 00 10 10 00 00 01 00 20 00 68 04 00 00 26 00 00 00 20 20 00 00 01 00 20 00 a8 10 00 00 8e 04 00 00 28 00 00 00 10 00 00 00 20 00 00 00 01 00 20 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 30 fd fd fd 96 fd fd fd d8 fd fd fd f9 fd fd fd f9 fd fd fd d7 fd fd fd 94 fe fe fe 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd 99 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 95 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd c1 ff ff ff ff fa fd f9 ff b4 d9 a7 ff 76 ba 5d ff 58 ab 3a ff 58 aa 3a ff 72 b8 59 ff ac d5 9d ff f8 fb f6 ff ff
                                                        Data Ascii: h& ( 0.v]X:X:rY
                                                        2024-10-02 16:37:00 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d8 fd fd fd 99 ff ff ff ff 92 cf fb ff 37 52 ec ff 38 46 ea ff d0 d4 fa ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 96 fe fe fe 32 ff ff ff ff f9 f9 fe ff 56 62 ed ff 35 43 ea ff 3b 49 eb ff 95 9c f4 ff cf d2 fa ff d1 d4 fa ff 96 9d f4 ff 52 5e ed ff e1 e3 fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 30 00 00 00 00 fd fd fd 9d ff ff ff ff e8 ea fd ff 58 63 ee ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 6c 76 f0 ff ff ff ff ff ff ff ff ff fd fd fd 98 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd c3 ff ff ff ff f9 f9 fe ff a5 ac f6 ff 5d 69 ee ff 3c
                                                        Data Ascii: 7R8F2Vb5C;IR^0Xc5C5C5C5C5C5Clv]i<
                                                        2024-10-02 16:37:00 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d0 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd fd fd 8b ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff b1 d8 a3 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 60 a5 35 ff ca 8e 3e ff f9 c1 9f ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 87 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 25 fd fd fd fb ff ff ff ff ff ff ff ff ff ff ff ff c2 e0 b7 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 6e b6 54 ff 9f ce 8d ff b7 da aa ff b8 db ab ff a5 d2 95 ff 7b bc 64 ff 54 a8 35 ff 53 a8 34 ff 77 a0 37 ff e3 89 41 ff f4 85 42 ff f4 85 42
                                                        Data Ascii: S4S4S4S4S4S4S4S4S4S4S4S4S4S4`5>%S4S4S4S4S4S4nT{dT5S4w7ABB
                                                        2024-10-02 16:37:00 UTC1390INData Raw: 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff fb d5 bf ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd ea fd fd fd cb ff ff ff ff ff ff ff ff ff ff ff ff 46 cd fc ff 05 bc fb ff 05 bc fb ff 05 bc fb ff 21 ae f9 ff fb fb ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd c8 fd fd fd 9c ff ff ff ff ff ff ff ff ff ff ff ff 86 df fd ff 05 bc fb ff 05 bc fb ff 15 93 f5 ff 34 49 eb ff b3 b8 f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                        Data Ascii: BBBBBBBF!4I
                                                        2024-10-02 16:37:00 UTC576INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d2 fe fe fe 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd 8d fd fd fd fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd fb fd fd fd 8b fe fe fe 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 27 fd fd fd 9f fd fd fd f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                        Data Ascii: $'


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        11192.168.2.549759142.250.186.784437656C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 16:37:06 UTC1307OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1224
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: text/plain;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=YwyE3uF8hFD0dX8-X0hCAKvfxdZzDD1p1lFqiWJ0jR9oI9lhIAZ5zHrbnvsnOdyukmck4Ki6PSUyqUvQdpH1qOp8W5aF_2Il_n_TQp4jiJkZPt8NVi7zWLcIfps0qHSSM8Y9abnWKUnKwUBdHrkPP0aPgrTjWdGO32CrqNkG5zAT35JI4rE
                                                        2024-10-02 16:37:06 UTC1224OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 34 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 35 35 38 2c 5b 5b 22 31 37 32 37 38 38 37 30 31 34 30 30 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,null,null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[4,0,0,0,0]]],558,[["1727887014000",null,null,null,
                                                        2024-10-02 16:37:06 UTC941INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=bLdisYdfENNshPrUStd9MzVnzn_Q_Ofi495vM3gIsZWDCz4z6CvSCwAgqus6J1tR8BJ0EU7COrN5IqrO001MI0PWfmO6tK145FpWguXCLhaCx_pmsc3h0blmFTLAHusb4h8xPpV8hPyF7eUW1XfxrN2Q7bmUYmNVE1Q4ulb4RIGxp_wzBgX4j9fd45E; expires=Thu, 03-Apr-2025 16:37:06 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 16:37:06 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Wed, 02 Oct 2024 16:37:06 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 16:37:06 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 16:37:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        12192.168.2.549760142.250.186.784437656C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 16:37:28 UTC1338OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1375
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=bLdisYdfENNshPrUStd9MzVnzn_Q_Ofi495vM3gIsZWDCz4z6CvSCwAgqus6J1tR8BJ0EU7COrN5IqrO001MI0PWfmO6tK145FpWguXCLhaCx_pmsc3h0blmFTLAHusb4h8xPpV8hPyF7eUW1XfxrN2Q7bmUYmNVE1Q4ulb4RIGxp_wzBgX4j9fd45E
                                                        2024-10-02 16:37:28 UTC1375OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 37 30 34 37 30 31 32 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727887047012",null,null,null
                                                        2024-10-02 16:37:28 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 16:37:28 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 16:37:28 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 16:37:28 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        13192.168.2.549761142.250.186.784437656C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 16:37:28 UTC1338OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1310
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=bLdisYdfENNshPrUStd9MzVnzn_Q_Ofi495vM3gIsZWDCz4z6CvSCwAgqus6J1tR8BJ0EU7COrN5IqrO001MI0PWfmO6tK145FpWguXCLhaCx_pmsc3h0blmFTLAHusb4h8xPpV8hPyF7eUW1XfxrN2Q7bmUYmNVE1Q4ulb4RIGxp_wzBgX4j9fd45E
                                                        2024-10-02 16:37:28 UTC1310OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 37 30 34 37 35 35 36 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727887047556",null,null,null
                                                        2024-10-02 16:37:29 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 16:37:29 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 16:37:29 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 16:37:29 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        14192.168.2.549762142.250.186.784437656C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 16:37:29 UTC1298OUTPOST /log?hasfast=true&authuser=0&format=json HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1030
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        Content-Type: text/plain;charset=UTF-8
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: no-cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=bLdisYdfENNshPrUStd9MzVnzn_Q_Ofi495vM3gIsZWDCz4z6CvSCwAgqus6J1tR8BJ0EU7COrN5IqrO001MI0PWfmO6tK145FpWguXCLhaCx_pmsc3h0blmFTLAHusb4h8xPpV8hPyF7eUW1XfxrN2Q7bmUYmNVE1Q4ulb4RIGxp_wzBgX4j9fd45E
                                                        2024-10-02 16:37:29 UTC1030OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 62 6f 71 5f 69 64 65 6e 74 69 74 79 66 72 6f 6e 74 65 6e 64 61 75 74 68 75 69 73 65 72 76 65 72 5f 32 30 32 34 30 39 32 39 2e 30 37 5f 70 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 33 2c 30 2c 30
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"boq_identityfrontendauthuiserver_20240929.07_p0",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[3,0,0
                                                        2024-10-02 16:37:29 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 16:37:29 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 16:37:29 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 16:37:29 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        15192.168.2.54976320.114.59.183443
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 16:37:38 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=aHerFlXCZkv5WmU&MD=KPHoKgds HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                        Host: slscr.update.microsoft.com
                                                        2024-10-02 16:37:38 UTC560INHTTP/1.1 200 OK
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Content-Type: application/octet-stream
                                                        Expires: -1
                                                        Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                        ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                                                        MS-CorrelationId: f69e11e2-b542-40bf-8ca2-92922ca3d255
                                                        MS-RequestId: c529e17b-a996-4152-b5d1-8ec4401fd3df
                                                        MS-CV: 1src4b6CJEm2mA9P.0
                                                        X-Microsoft-SLSClientCache: 1440
                                                        Content-Disposition: attachment; filename=environment.cab
                                                        X-Content-Type-Options: nosniff
                                                        Date: Wed, 02 Oct 2024 16:37:37 GMT
                                                        Connection: close
                                                        Content-Length: 30005
                                                        2024-10-02 16:37:38 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                                                        Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                                                        2024-10-02 16:37:38 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                                                        Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        16192.168.2.549768216.58.206.784437656C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 16:38:00 UTC1338OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1260
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=bLdisYdfENNshPrUStd9MzVnzn_Q_Ofi495vM3gIsZWDCz4z6CvSCwAgqus6J1tR8BJ0EU7COrN5IqrO001MI0PWfmO6tK145FpWguXCLhaCx_pmsc3h0blmFTLAHusb4h8xPpV8hPyF7eUW1XfxrN2Q7bmUYmNVE1Q4ulb4RIGxp_wzBgX4j9fd45E
                                                        2024-10-02 16:38:00 UTC1260OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 37 30 37 39 33 39 38 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727887079398",null,null,null
                                                        2024-10-02 16:38:00 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 16:38:00 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 16:38:00 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 16:38:00 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        17192.168.2.549769216.58.206.784437656C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 16:38:00 UTC1338OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1318
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=bLdisYdfENNshPrUStd9MzVnzn_Q_Ofi495vM3gIsZWDCz4z6CvSCwAgqus6J1tR8BJ0EU7COrN5IqrO001MI0PWfmO6tK145FpWguXCLhaCx_pmsc3h0blmFTLAHusb4h8xPpV8hPyF7eUW1XfxrN2Q7bmUYmNVE1Q4ulb4RIGxp_wzBgX4j9fd45E
                                                        2024-10-02 16:38:00 UTC1318OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 37 30 37 39 35 30 36 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727887079506",null,null,null
                                                        2024-10-02 16:38:01 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 16:38:00 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 16:38:01 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 16:38:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        18192.168.2.549772216.58.206.784437656C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 16:38:32 UTC1338OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1311
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=bLdisYdfENNshPrUStd9MzVnzn_Q_Ofi495vM3gIsZWDCz4z6CvSCwAgqus6J1tR8BJ0EU7COrN5IqrO001MI0PWfmO6tK145FpWguXCLhaCx_pmsc3h0blmFTLAHusb4h8xPpV8hPyF7eUW1XfxrN2Q7bmUYmNVE1Q4ulb4RIGxp_wzBgX4j9fd45E
                                                        2024-10-02 16:38:32 UTC1311OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 37 31 31 31 31 38 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727887111180",null,null,null
                                                        2024-10-02 16:38:32 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 16:38:32 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 16:38:32 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 16:38:32 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        19192.168.2.549773216.58.206.784437656C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 16:38:32 UTC1338OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1297
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIlqHLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=bLdisYdfENNshPrUStd9MzVnzn_Q_Ofi495vM3gIsZWDCz4z6CvSCwAgqus6J1tR8BJ0EU7COrN5IqrO001MI0PWfmO6tK145FpWguXCLhaCx_pmsc3h0blmFTLAHusb4h8xPpV8hPyF7eUW1XfxrN2Q7bmUYmNVE1Q4ulb4RIGxp_wzBgX4j9fd45E
                                                        2024-10-02 16:38:32 UTC1297OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 37 31 31 31 32 32 36 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727887111226",null,null,null
                                                        2024-10-02 16:38:32 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 16:38:32 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 16:38:32 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 16:38:32 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:12:36:42
                                                        Start date:02/10/2024
                                                        Path:C:\Users\user\Desktop\file.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\file.exe"
                                                        Imagebase:0x790000
                                                        File size:918'528 bytes
                                                        MD5 hash:9C54DC2F18FC09F760AB7267A4548200
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:1
                                                        Start time:12:36:42
                                                        Start date:02/10/2024
                                                        Path:C:\Windows\SysWOW64\taskkill.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:taskkill /F /IM chrome.exe /T
                                                        Imagebase:0xc40000
                                                        File size:74'240 bytes
                                                        MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:2
                                                        Start time:12:36:42
                                                        Start date:02/10/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:4
                                                        Start time:12:36:44
                                                        Start date:02/10/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
                                                        Imagebase:0x7ff715980000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:6
                                                        Start time:12:36:45
                                                        Start date:02/10/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2540 --field-trial-handle=2040,i,10395247383509564896,14380982940132082764,262144 /prefetch:8
                                                        Imagebase:0x7ff715980000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:7
                                                        Start time:12:36:56
                                                        Start date:02/10/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5532 --field-trial-handle=2040,i,10395247383509564896,14380982940132082764,262144 /prefetch:8
                                                        Imagebase:0x7ff715980000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:8
                                                        Start time:12:36:56
                                                        Start date:02/10/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 --field-trial-handle=2040,i,10395247383509564896,14380982940132082764,262144 /prefetch:8
                                                        Imagebase:0x7ff715980000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:2.2%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:4.2%
                                                          Total number of Nodes:1616
                                                          Total number of Limit Nodes:66
                                                          execution_graph 94735 7ccabc 94736 7ccac5 94735->94736 94737 7ccace 94735->94737 94739 7cc9bb 94736->94739 94759 7c2d74 GetLastError 94739->94759 94741 7cc9c8 94780 7ccada 94741->94780 94743 7cc9d0 94789 7cc74f 94743->94789 94746 7cc9e7 94746->94737 94749 7cca2a 94805 7c29c8 94749->94805 94751 7cca1d 94753 7cca25 94751->94753 94756 7cca42 94751->94756 94804 7bf2d9 20 API calls _abort 94753->94804 94755 7cca6e 94755->94749 94811 7cc625 26 API calls 94755->94811 94756->94755 94757 7c29c8 _free 20 API calls 94756->94757 94757->94755 94760 7c2d8a 94759->94760 94761 7c2d96 94759->94761 94812 7c320e 11 API calls 2 library calls 94760->94812 94813 7c4c7d 20 API calls 2 library calls 94761->94813 94764 7c2d90 94764->94761 94766 7c2ddf SetLastError 94764->94766 94765 7c2da2 94767 7c2daa 94765->94767 94814 7c3264 11 API calls 2 library calls 94765->94814 94766->94741 94769 7c29c8 _free 20 API calls 94767->94769 94771 7c2db0 94769->94771 94770 7c2dbf 94770->94767 94772 7c2dc6 94770->94772 94773 7c2deb SetLastError 94771->94773 94815 7c2be6 20 API calls _abort 94772->94815 94816 7c28a7 38 API calls _abort 94773->94816 94775 7c2dd1 94777 7c29c8 _free 20 API calls 94775->94777 94779 7c2dd8 94777->94779 94779->94766 94779->94773 94781 7ccae6 BuildCatchObjectHelperInternal 94780->94781 94782 7c2d74 _abort 38 API calls 94781->94782 94784 7ccaf0 94782->94784 94785 7ccb74 __wsopen_s 94784->94785 94788 7c29c8 _free 20 API calls 94784->94788 94817 7c28a7 38 API calls _abort 94784->94817 94818 7c2f5e EnterCriticalSection 94784->94818 94819 7ccb6b LeaveCriticalSection _abort 94784->94819 94785->94743 94788->94784 94820 7b49a5 94789->94820 94792 7cc770 GetOEMCP 94794 7cc799 94792->94794 94793 7cc782 94793->94794 94795 7cc787 GetACP 94793->94795 94794->94746 94796 7c3820 94794->94796 94795->94794 94797 7c385e 94796->94797 94801 7c382e _abort 94796->94801 94831 7bf2d9 20 API calls _abort 94797->94831 94799 7c3849 RtlAllocateHeap 94800 7c385c 94799->94800 94799->94801 94800->94749 94803 7ccb7c 51 API calls 2 library calls 94800->94803 94801->94797 94801->94799 94830 7b4ead 7 API calls 2 library calls 94801->94830 94803->94751 94804->94749 94806 7c29d3 RtlFreeHeap 94805->94806 94810 7c29fc __dosmaperr 94805->94810 94807 7c29e8 94806->94807 94806->94810 94832 7bf2d9 20 API calls _abort 94807->94832 94809 7c29ee GetLastError 94809->94810 94810->94746 94811->94749 94812->94764 94813->94765 94814->94770 94815->94775 94818->94784 94819->94784 94821 7b49b8 94820->94821 94822 7b49c2 94820->94822 94821->94792 94821->94793 94822->94821 94823 7c2d74 _abort 38 API calls 94822->94823 94824 7b49e3 94823->94824 94828 7c2ec3 38 API calls __cftof 94824->94828 94826 7b49fc 94829 7c2ef0 38 API calls __cftof 94826->94829 94828->94826 94829->94821 94830->94801 94831->94800 94832->94809 94833 7b03fb 94834 7b0407 BuildCatchObjectHelperInternal 94833->94834 94862 7afeb1 94834->94862 94836 7b040e 94837 7b0561 94836->94837 94840 7b0438 94836->94840 94892 7b083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 94837->94892 94839 7b0568 94885 7b4e52 94839->94885 94849 7b0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 94840->94849 94873 7c247d 94840->94873 94847 7b0457 94852 7b04d8 94849->94852 94888 7b4e1a 38 API calls 2 library calls 94849->94888 94881 7b0959 94852->94881 94853 7b04de 94854 7b04f3 94853->94854 94889 7b0992 GetModuleHandleW 94854->94889 94856 7b04fa 94856->94839 94857 7b04fe 94856->94857 94858 7b0507 94857->94858 94890 7b4df5 28 API calls _abort 94857->94890 94891 7b0040 13 API calls 2 library calls 94858->94891 94861 7b050f 94861->94847 94863 7afeba 94862->94863 94894 7b0698 IsProcessorFeaturePresent 94863->94894 94865 7afec6 94895 7b2c94 10 API calls 3 library calls 94865->94895 94867 7afecb 94868 7afecf 94867->94868 94896 7c2317 94867->94896 94868->94836 94871 7afee6 94871->94836 94876 7c2494 94873->94876 94874 7b0a8c CatchGuardHandler 5 API calls 94875 7b0451 94874->94875 94875->94847 94877 7c2421 94875->94877 94876->94874 94878 7c2450 94877->94878 94879 7b0a8c CatchGuardHandler 5 API calls 94878->94879 94880 7c2479 94879->94880 94880->94849 94912 7b2340 94881->94912 94884 7b097f 94884->94853 94914 7b4bcf 94885->94914 94888->94852 94889->94856 94890->94858 94891->94861 94892->94839 94894->94865 94895->94867 94900 7cd1f6 94896->94900 94899 7b2cbd 8 API calls 3 library calls 94899->94868 94903 7cd20f 94900->94903 94902 7afed8 94902->94871 94902->94899 94904 7b0a8c 94903->94904 94905 7b0a97 IsProcessorFeaturePresent 94904->94905 94906 7b0a95 94904->94906 94908 7b0c5d 94905->94908 94906->94902 94911 7b0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 94908->94911 94910 7b0d40 94910->94902 94911->94910 94913 7b096c GetStartupInfoW 94912->94913 94913->94884 94915 7b4bdb _abort 94914->94915 94916 7b4be2 94915->94916 94917 7b4bf4 94915->94917 94953 7b4d29 GetModuleHandleW 94916->94953 94938 7c2f5e EnterCriticalSection 94917->94938 94920 7b4be7 94920->94917 94954 7b4d6d GetModuleHandleExW 94920->94954 94924 7b4c70 94928 7b4c88 94924->94928 94934 7c2421 _abort 5 API calls 94924->94934 94926 7b4ce2 94962 7d1d29 5 API calls CatchGuardHandler 94926->94962 94927 7b4cb6 94945 7b4ce8 94927->94945 94929 7c2421 _abort 5 API calls 94928->94929 94935 7b4c99 94929->94935 94930 7b4bfb 94930->94924 94930->94935 94939 7c21a8 94930->94939 94934->94928 94942 7b4cd9 94935->94942 94938->94930 94963 7c1ee1 94939->94963 94982 7c2fa6 LeaveCriticalSection 94942->94982 94944 7b4cb2 94944->94926 94944->94927 94983 7c360c 94945->94983 94948 7b4d16 94951 7b4d6d _abort 8 API calls 94948->94951 94949 7b4cf6 GetPEB 94949->94948 94950 7b4d06 GetCurrentProcess TerminateProcess 94949->94950 94950->94948 94952 7b4d1e ExitProcess 94951->94952 94953->94920 94955 7b4dba 94954->94955 94956 7b4d97 GetProcAddress 94954->94956 94957 7b4dc9 94955->94957 94958 7b4dc0 FreeLibrary 94955->94958 94960 7b4dac 94956->94960 94959 7b0a8c CatchGuardHandler 5 API calls 94957->94959 94958->94957 94961 7b4bf3 94959->94961 94960->94955 94961->94917 94966 7c1e90 94963->94966 94965 7c1f05 94965->94924 94967 7c1e9c BuildCatchObjectHelperInternal 94966->94967 94974 7c2f5e EnterCriticalSection 94967->94974 94969 7c1eaa 94975 7c1f31 94969->94975 94973 7c1ec8 __wsopen_s 94973->94965 94974->94969 94976 7c1f51 94975->94976 94979 7c1f59 94975->94979 94977 7b0a8c CatchGuardHandler 5 API calls 94976->94977 94978 7c1eb7 94977->94978 94981 7c1ed5 LeaveCriticalSection _abort 94978->94981 94979->94976 94980 7c29c8 _free 20 API calls 94979->94980 94980->94976 94981->94973 94982->94944 94984 7c3627 94983->94984 94985 7c3631 94983->94985 94987 7b0a8c CatchGuardHandler 5 API calls 94984->94987 94990 7c2fd7 5 API calls 2 library calls 94985->94990 94988 7b4cf2 94987->94988 94988->94948 94988->94949 94989 7c3648 94989->94984 94990->94989 94991 791098 94996 7942de 94991->94996 94995 7910a7 95017 79a961 94996->95017 95000 794342 95013 794378 95000->95013 95034 7993b2 95000->95034 95002 79436c 95038 7937a0 95002->95038 95003 79441b GetCurrentProcess IsWow64Process 95005 794437 95003->95005 95006 79444f LoadLibraryA 95005->95006 95007 7d3824 GetSystemInfo 95005->95007 95008 79449c GetSystemInfo 95006->95008 95009 794460 GetProcAddress 95006->95009 95010 794476 95008->95010 95009->95008 95012 794470 GetNativeSystemInfo 95009->95012 95014 79447a FreeLibrary 95010->95014 95015 79109d 95010->95015 95011 7d37df 95012->95010 95013->95003 95013->95011 95014->95015 95016 7b00a3 29 API calls __onexit 95015->95016 95016->94995 95042 7afe0b 95017->95042 95019 79a976 95052 7afddb 95019->95052 95021 7942f5 GetVersionExW 95022 796b57 95021->95022 95023 7d4ba1 95022->95023 95024 796b67 _wcslen 95022->95024 95025 7993b2 22 API calls 95023->95025 95027 796b7d 95024->95027 95028 796ba2 95024->95028 95026 7d4baa 95025->95026 95026->95026 95077 796f34 22 API calls 95027->95077 95029 7afddb 22 API calls 95028->95029 95031 796bae 95029->95031 95033 7afe0b 22 API calls 95031->95033 95032 796b85 __fread_nolock 95032->95000 95033->95032 95035 7993c0 95034->95035 95036 7993c9 __fread_nolock 95034->95036 95035->95036 95078 79aec9 95035->95078 95036->95002 95036->95036 95039 7937ae 95038->95039 95040 7993b2 22 API calls 95039->95040 95041 7937c2 95040->95041 95041->95013 95045 7afddb 95042->95045 95044 7afdfa 95044->95019 95045->95044 95048 7afdfc 95045->95048 95062 7b4ead 7 API calls 2 library calls 95045->95062 95063 7bea0c 95045->95063 95047 7b066d 95071 7b32a4 RaiseException 95047->95071 95048->95047 95070 7b32a4 RaiseException 95048->95070 95051 7b068a 95051->95019 95055 7afde0 95052->95055 95053 7bea0c ___std_exception_copy 21 API calls 95053->95055 95054 7afdfa 95054->95021 95055->95053 95055->95054 95058 7afdfc 95055->95058 95074 7b4ead 7 API calls 2 library calls 95055->95074 95057 7b066d 95076 7b32a4 RaiseException 95057->95076 95058->95057 95075 7b32a4 RaiseException 95058->95075 95061 7b068a 95061->95021 95062->95045 95069 7c3820 _abort 95063->95069 95064 7c385e 95073 7bf2d9 20 API calls _abort 95064->95073 95066 7c3849 RtlAllocateHeap 95067 7c385c 95066->95067 95066->95069 95067->95045 95069->95064 95069->95066 95072 7b4ead 7 API calls 2 library calls 95069->95072 95070->95047 95071->95051 95072->95069 95073->95067 95074->95055 95075->95057 95076->95061 95077->95032 95079 79aedc 95078->95079 95083 79aed9 __fread_nolock 95078->95083 95080 7afddb 22 API calls 95079->95080 95081 79aee7 95080->95081 95082 7afe0b 22 API calls 95081->95082 95082->95083 95083->95036 95084 79105b 95089 79344d 95084->95089 95086 79106a 95120 7b00a3 29 API calls __onexit 95086->95120 95088 791074 95090 79345d __wsopen_s 95089->95090 95091 79a961 22 API calls 95090->95091 95092 793513 95091->95092 95121 793a5a 95092->95121 95094 79351c 95128 793357 95094->95128 95101 79a961 22 API calls 95102 79354d 95101->95102 95149 79a6c3 95102->95149 95105 7d3176 RegQueryValueExW 95106 7d320c RegCloseKey 95105->95106 95107 7d3193 95105->95107 95109 793578 95106->95109 95119 7d321e _wcslen 95106->95119 95108 7afe0b 22 API calls 95107->95108 95110 7d31ac 95108->95110 95109->95086 95155 795722 95110->95155 95111 794c6d 22 API calls 95111->95119 95114 7d31d4 95115 796b57 22 API calls 95114->95115 95116 7d31ee ISource 95115->95116 95116->95106 95118 79515f 22 API calls 95118->95119 95119->95109 95119->95111 95119->95118 95158 799cb3 95119->95158 95120->95088 95164 7d1f50 95121->95164 95124 799cb3 22 API calls 95125 793a8d 95124->95125 95166 793aa2 95125->95166 95127 793a97 95127->95094 95129 7d1f50 __wsopen_s 95128->95129 95130 793364 GetFullPathNameW 95129->95130 95131 793386 95130->95131 95132 796b57 22 API calls 95131->95132 95133 7933a4 95132->95133 95134 7933c6 95133->95134 95135 7933dd 95134->95135 95136 7d30bb 95134->95136 95176 7933ee 95135->95176 95137 7afddb 22 API calls 95136->95137 95140 7d30c5 _wcslen 95137->95140 95139 7933e8 95143 79515f 95139->95143 95141 7afe0b 22 API calls 95140->95141 95142 7d30fe __fread_nolock 95141->95142 95145 79516e 95143->95145 95148 79518f __fread_nolock 95143->95148 95144 7afddb 22 API calls 95146 793544 95144->95146 95147 7afe0b 22 API calls 95145->95147 95146->95101 95147->95148 95148->95144 95150 79a6dd 95149->95150 95151 793556 RegOpenKeyExW 95149->95151 95152 7afddb 22 API calls 95150->95152 95151->95105 95151->95109 95153 79a6e7 95152->95153 95154 7afe0b 22 API calls 95153->95154 95154->95151 95156 7afddb 22 API calls 95155->95156 95157 795734 RegQueryValueExW 95156->95157 95157->95114 95157->95116 95159 799cc2 _wcslen 95158->95159 95160 7afe0b 22 API calls 95159->95160 95161 799cea __fread_nolock 95160->95161 95162 7afddb 22 API calls 95161->95162 95163 799d00 95162->95163 95163->95119 95165 793a67 GetModuleFileNameW 95164->95165 95165->95124 95167 7d1f50 __wsopen_s 95166->95167 95168 793aaf GetFullPathNameW 95167->95168 95169 793ae9 95168->95169 95170 793ace 95168->95170 95172 79a6c3 22 API calls 95169->95172 95171 796b57 22 API calls 95170->95171 95173 793ada 95171->95173 95172->95173 95174 7937a0 22 API calls 95173->95174 95175 793ae6 95174->95175 95175->95127 95177 7933fe _wcslen 95176->95177 95178 7d311d 95177->95178 95179 793411 95177->95179 95180 7afddb 22 API calls 95178->95180 95186 79a587 95179->95186 95182 7d3127 95180->95182 95184 7afe0b 22 API calls 95182->95184 95183 79341e __fread_nolock 95183->95139 95185 7d3157 __fread_nolock 95184->95185 95187 79a59d 95186->95187 95190 79a598 __fread_nolock 95186->95190 95188 7afe0b 22 API calls 95187->95188 95189 7df80f 95187->95189 95188->95190 95189->95189 95190->95183 95191 79defc 95194 791d6f 95191->95194 95193 79df07 95195 791d8c 95194->95195 95203 791f6f 95195->95203 95197 791da6 95198 7d2759 95197->95198 95200 791e36 95197->95200 95201 791dc2 95197->95201 95207 80359c 82 API calls __wsopen_s 95198->95207 95200->95193 95201->95200 95206 79289a 23 API calls 95201->95206 95208 79ec40 95203->95208 95205 791f98 95205->95197 95206->95200 95207->95200 95227 79ec76 ISource 95208->95227 95209 7b00a3 29 API calls pre_c_initialization 95209->95227 95210 79fef7 95225 79ed9d ISource 95210->95225 95235 79a8c7 22 API calls __fread_nolock 95210->95235 95212 7afddb 22 API calls 95212->95227 95214 7e4600 95214->95225 95234 79a8c7 22 API calls __fread_nolock 95214->95234 95215 7e4b0b 95237 80359c 82 API calls __wsopen_s 95215->95237 95216 79a8c7 22 API calls 95216->95227 95222 7b0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95222->95227 95223 79fbe3 95223->95225 95226 7e4bdc 95223->95226 95231 79f3ae ISource 95223->95231 95224 79a961 22 API calls 95224->95227 95225->95205 95238 80359c 82 API calls __wsopen_s 95226->95238 95227->95209 95227->95210 95227->95212 95227->95214 95227->95215 95227->95216 95227->95222 95227->95223 95227->95224 95227->95225 95229 7e4beb 95227->95229 95230 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95227->95230 95227->95231 95232 7a01e0 349 API calls 2 library calls 95227->95232 95233 7a06a0 41 API calls ISource 95227->95233 95239 80359c 82 API calls __wsopen_s 95229->95239 95230->95227 95231->95225 95236 80359c 82 API calls __wsopen_s 95231->95236 95232->95227 95233->95227 95234->95225 95235->95225 95236->95225 95237->95225 95238->95229 95239->95225 95240 79f7bf 95241 79f7d3 95240->95241 95242 79fcb6 95240->95242 95243 79fcc2 95241->95243 95245 7afddb 22 API calls 95241->95245 95334 79aceb 95242->95334 95246 79aceb 23 API calls 95243->95246 95247 79f7e5 95245->95247 95249 79fd3d 95246->95249 95247->95243 95248 79f83e 95247->95248 95247->95249 95273 79ed9d ISource 95248->95273 95275 7a1310 95248->95275 95344 801155 22 API calls 95249->95344 95252 79fef7 95252->95273 95346 79a8c7 22 API calls __fread_nolock 95252->95346 95255 7e4600 95255->95273 95345 79a8c7 22 API calls __fread_nolock 95255->95345 95256 7e4b0b 95348 80359c 82 API calls __wsopen_s 95256->95348 95257 79a8c7 22 API calls 95272 79ec76 ISource 95257->95272 95263 79fbe3 95265 7e4bdc 95263->95265 95263->95273 95274 79f3ae ISource 95263->95274 95264 79a961 22 API calls 95264->95272 95349 80359c 82 API calls __wsopen_s 95265->95349 95267 7b00a3 29 API calls pre_c_initialization 95267->95272 95268 7b0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95268->95272 95269 7e4beb 95350 80359c 82 API calls __wsopen_s 95269->95350 95270 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95270->95272 95271 7afddb 22 API calls 95271->95272 95272->95252 95272->95255 95272->95256 95272->95257 95272->95263 95272->95264 95272->95267 95272->95268 95272->95269 95272->95270 95272->95271 95272->95273 95272->95274 95332 7a01e0 349 API calls 2 library calls 95272->95332 95333 7a06a0 41 API calls ISource 95272->95333 95274->95273 95347 80359c 82 API calls __wsopen_s 95274->95347 95276 7a17b0 95275->95276 95277 7a1376 95275->95277 95392 7b0242 5 API calls __Init_thread_wait 95276->95392 95279 7a1390 95277->95279 95280 7e6331 95277->95280 95351 7a1940 95279->95351 95396 81709c 349 API calls 95280->95396 95282 7a17ba 95287 799cb3 22 API calls 95282->95287 95289 7a17fb 95282->95289 95284 7e633d 95284->95272 95286 7a1940 9 API calls 95288 7a13b6 95286->95288 95295 7a17d4 95287->95295 95288->95289 95291 7a13ec 95288->95291 95290 7e6346 95289->95290 95292 7a182c 95289->95292 95397 80359c 82 API calls __wsopen_s 95290->95397 95291->95290 95315 7a1408 __fread_nolock 95291->95315 95293 79aceb 23 API calls 95292->95293 95296 7a1839 95293->95296 95393 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95295->95393 95394 7ad217 349 API calls 95296->95394 95299 7e636e 95398 80359c 82 API calls __wsopen_s 95299->95398 95300 7a152f 95302 7a153c 95300->95302 95303 7e63d1 95300->95303 95305 7a1940 9 API calls 95302->95305 95400 815745 54 API calls _wcslen 95303->95400 95306 7a1549 95305->95306 95309 7e64fa 95306->95309 95311 7a1940 9 API calls 95306->95311 95307 7afddb 22 API calls 95307->95315 95308 7afe0b 22 API calls 95308->95315 95319 7e6369 95309->95319 95402 80359c 82 API calls __wsopen_s 95309->95402 95310 7a1872 95395 7afaeb 23 API calls 95310->95395 95317 7a1563 95311->95317 95314 79ec40 349 API calls 95314->95315 95315->95296 95315->95299 95315->95300 95315->95307 95315->95308 95315->95314 95316 7e63b2 95315->95316 95315->95319 95399 80359c 82 API calls __wsopen_s 95316->95399 95317->95309 95322 7a15c7 ISource 95317->95322 95401 79a8c7 22 API calls __fread_nolock 95317->95401 95319->95272 95321 7a1940 9 API calls 95321->95322 95322->95309 95322->95310 95322->95319 95322->95321 95324 7a167b ISource 95322->95324 95361 81abf7 95322->95361 95366 81ab67 95322->95366 95369 805c5a 95322->95369 95374 8228ab 95322->95374 95379 7af645 95322->95379 95386 81a2ea 95322->95386 95323 7a171d 95323->95272 95324->95323 95391 7ace17 22 API calls ISource 95324->95391 95332->95272 95333->95272 95335 79acf9 95334->95335 95343 79ad2a ISource 95334->95343 95336 79ad55 95335->95336 95338 79ad01 ISource 95335->95338 95336->95343 95605 79a8c7 22 API calls __fread_nolock 95336->95605 95339 7dfa48 95338->95339 95340 79ad21 95338->95340 95338->95343 95339->95343 95606 7ace17 22 API calls ISource 95339->95606 95341 7dfa3a VariantClear 95340->95341 95340->95343 95341->95343 95343->95243 95344->95273 95345->95273 95346->95273 95347->95273 95348->95273 95349->95269 95350->95273 95352 7a1981 95351->95352 95358 7a195d 95351->95358 95403 7b0242 5 API calls __Init_thread_wait 95352->95403 95354 7a198b 95354->95358 95404 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95354->95404 95356 7a8727 95360 7a13a0 95356->95360 95406 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95356->95406 95358->95360 95405 7b0242 5 API calls __Init_thread_wait 95358->95405 95360->95286 95407 81aff9 95361->95407 95363 81ac54 95363->95322 95364 81ac0c 95364->95363 95365 79aceb 23 API calls 95364->95365 95365->95363 95367 81aff9 217 API calls 95366->95367 95368 81ab79 95367->95368 95368->95322 95370 797510 53 API calls 95369->95370 95371 805c6d 95370->95371 95562 7fdbbe lstrlenW 95371->95562 95373 805c77 95373->95322 95567 822b30 95374->95567 95376 8228b9 95377 79aceb 23 API calls 95376->95377 95378 822901 95377->95378 95378->95322 95380 79b567 39 API calls 95379->95380 95381 7af659 95380->95381 95382 7ef2dc Sleep 95381->95382 95383 7af661 timeGetTime 95381->95383 95384 79b567 39 API calls 95383->95384 95385 7af677 95384->95385 95385->95322 95387 797510 53 API calls 95386->95387 95388 81a306 95387->95388 95584 7fd4dc CreateToolhelp32Snapshot Process32FirstW 95388->95584 95390 81a315 95390->95322 95391->95324 95392->95282 95393->95289 95394->95310 95395->95310 95396->95284 95397->95319 95398->95319 95399->95319 95400->95317 95401->95322 95402->95319 95403->95354 95404->95358 95405->95356 95406->95360 95408 81b01d ___scrt_fastfail 95407->95408 95409 81b094 95408->95409 95410 81b058 95408->95410 95414 79b567 39 API calls 95409->95414 95415 81b08b 95409->95415 95528 79b567 95410->95528 95412 81b063 95412->95415 95418 79b567 39 API calls 95412->95418 95413 81b0ed 95498 797510 95413->95498 95417 81b0a5 95414->95417 95415->95413 95419 79b567 39 API calls 95415->95419 95421 79b567 39 API calls 95417->95421 95422 81b078 95418->95422 95419->95413 95421->95415 95424 79b567 39 API calls 95422->95424 95424->95415 95425 81b115 95426 81b1d8 95425->95426 95427 81b11f 95425->95427 95429 81b20a GetCurrentDirectoryW 95426->95429 95432 797510 53 API calls 95426->95432 95428 797510 53 API calls 95427->95428 95430 81b130 95428->95430 95431 7afe0b 22 API calls 95429->95431 95433 797620 22 API calls 95430->95433 95434 81b22f GetCurrentDirectoryW 95431->95434 95435 81b1ef 95432->95435 95436 81b13a 95433->95436 95437 81b23c 95434->95437 95438 797620 22 API calls 95435->95438 95439 797510 53 API calls 95436->95439 95442 81b275 95437->95442 95533 799c6e 22 API calls 95437->95533 95440 81b1f9 _wcslen 95438->95440 95441 81b14b 95439->95441 95440->95429 95440->95442 95443 797620 22 API calls 95441->95443 95449 81b287 95442->95449 95450 81b28b 95442->95450 95445 81b155 95443->95445 95447 797510 53 API calls 95445->95447 95446 81b255 95534 799c6e 22 API calls 95446->95534 95452 81b166 95447->95452 95455 81b2f8 95449->95455 95456 81b39a CreateProcessW 95449->95456 95536 8007c0 10 API calls 95450->95536 95457 797620 22 API calls 95452->95457 95453 81b265 95535 799c6e 22 API calls 95453->95535 95454 81b294 95537 8006e6 10 API calls 95454->95537 95539 7f11c8 39 API calls 95455->95539 95497 81b32f _wcslen 95456->95497 95461 81b170 95457->95461 95464 81b1a6 GetSystemDirectoryW 95461->95464 95469 797510 53 API calls 95461->95469 95462 81b2aa 95538 8005a7 8 API calls 95462->95538 95463 81b2fd 95467 81b323 95463->95467 95468 81b32a 95463->95468 95466 7afe0b 22 API calls 95464->95466 95472 81b1cb GetSystemDirectoryW 95466->95472 95540 7f1201 128 API calls 2 library calls 95467->95540 95541 7f14ce 6 API calls 95468->95541 95474 81b187 95469->95474 95471 81b2d0 95471->95449 95472->95437 95475 797620 22 API calls 95474->95475 95477 81b191 _wcslen 95475->95477 95476 81b328 95476->95497 95477->95437 95477->95464 95478 81b3d6 GetLastError 95487 81b41a 95478->95487 95479 81b42f CloseHandle 95480 81b43f 95479->95480 95488 81b49a 95479->95488 95481 81b451 95480->95481 95482 81b446 CloseHandle 95480->95482 95485 81b463 95481->95485 95486 81b458 CloseHandle 95481->95486 95482->95481 95484 81b4a6 95484->95487 95489 81b475 95485->95489 95490 81b46a CloseHandle 95485->95490 95486->95485 95525 800175 95487->95525 95488->95484 95493 81b4d2 CloseHandle 95488->95493 95542 8009d9 34 API calls 95489->95542 95490->95489 95493->95487 95495 81b486 95543 81b536 25 API calls 95495->95543 95497->95478 95497->95479 95497->95497 95499 797525 95498->95499 95515 797522 95498->95515 95500 79755b 95499->95500 95501 79752d 95499->95501 95504 79756d 95500->95504 95509 7d500f 95500->95509 95512 7d50f6 95500->95512 95544 7b51c6 26 API calls 95501->95544 95545 7afb21 51 API calls 95504->95545 95505 7d510e 95505->95505 95507 79753d 95508 7afddb 22 API calls 95507->95508 95511 797547 95508->95511 95514 7afe0b 22 API calls 95509->95514 95516 7d5088 95509->95516 95513 799cb3 22 API calls 95511->95513 95547 7b5183 26 API calls 95512->95547 95513->95515 95517 7d5058 95514->95517 95521 797620 95515->95521 95546 7afb21 51 API calls 95516->95546 95518 7afddb 22 API calls 95517->95518 95519 7d507f 95518->95519 95520 799cb3 22 API calls 95519->95520 95520->95516 95522 79762a _wcslen 95521->95522 95523 7afe0b 22 API calls 95522->95523 95524 79763f 95523->95524 95524->95425 95548 80030f 95525->95548 95529 79b578 95528->95529 95531 79b57f 95528->95531 95529->95531 95561 7b62d1 39 API calls _strftime 95529->95561 95531->95412 95532 79b5c2 95532->95412 95533->95446 95534->95453 95535->95442 95536->95454 95537->95462 95538->95471 95539->95463 95540->95476 95541->95497 95542->95495 95543->95488 95544->95507 95545->95507 95546->95512 95547->95505 95549 800321 CloseHandle 95548->95549 95550 800329 95548->95550 95549->95550 95551 800336 95550->95551 95552 80032e CloseHandle 95550->95552 95553 800343 95551->95553 95554 80033b CloseHandle 95551->95554 95552->95551 95555 800350 95553->95555 95556 800348 CloseHandle 95553->95556 95554->95553 95557 800355 CloseHandle 95555->95557 95558 80035d 95555->95558 95556->95555 95557->95558 95559 800362 CloseHandle 95558->95559 95560 80017d 95558->95560 95559->95560 95560->95364 95561->95532 95563 7fdbdc GetFileAttributesW 95562->95563 95564 7fdc06 95562->95564 95563->95564 95565 7fdbe8 FindFirstFileW 95563->95565 95564->95373 95565->95564 95566 7fdbf9 FindClose 95565->95566 95566->95564 95573 822ad8 95567->95573 95570 822b51 timeGetTime 95570->95376 95571 79b567 39 API calls 95571->95570 95574 79aceb 23 API calls 95573->95574 95575 822af3 95574->95575 95576 822aff 95575->95576 95577 822b1d 95575->95577 95578 797510 53 API calls 95576->95578 95579 796b57 22 API calls 95577->95579 95580 822b0c 95578->95580 95581 822b1b 95579->95581 95580->95581 95583 79a8c7 22 API calls __fread_nolock 95580->95583 95581->95570 95581->95571 95583->95581 95594 7fdef7 95584->95594 95586 7fd5db CloseHandle 95586->95390 95587 7fd529 Process32NextW 95587->95586 95593 7fd522 95587->95593 95588 79a961 22 API calls 95588->95593 95589 799cb3 22 API calls 95589->95593 95593->95586 95593->95587 95593->95588 95593->95589 95600 79525f 22 API calls 95593->95600 95601 796350 22 API calls 95593->95601 95602 7ace60 41 API calls 95593->95602 95599 7fdf02 95594->95599 95595 7fdf19 95604 7b62fb 39 API calls _strftime 95595->95604 95598 7fdf1f 95598->95593 95599->95595 95599->95598 95603 7b63b2 GetStringTypeW _strftime 95599->95603 95600->95593 95601->95593 95602->95593 95603->95599 95604->95598 95605->95343 95606->95343 95607 791033 95612 794c91 95607->95612 95611 791042 95613 79a961 22 API calls 95612->95613 95614 794cff 95613->95614 95620 793af0 95614->95620 95617 794d9c 95618 791038 95617->95618 95623 7951f7 22 API calls __fread_nolock 95617->95623 95619 7b00a3 29 API calls __onexit 95618->95619 95619->95611 95624 793b1c 95620->95624 95623->95617 95625 793b0f 95624->95625 95626 793b29 95624->95626 95625->95617 95626->95625 95627 793b30 RegOpenKeyExW 95626->95627 95627->95625 95628 793b4a RegQueryValueExW 95627->95628 95629 793b6b 95628->95629 95630 793b80 RegCloseKey 95628->95630 95629->95630 95630->95625 95631 7e3f75 95642 7aceb1 95631->95642 95633 7e3f8b 95635 7e4006 95633->95635 95709 7ae300 23 API calls 95633->95709 95651 79bf40 95635->95651 95638 7e4052 95640 7e4a88 95638->95640 95711 80359c 82 API calls __wsopen_s 95638->95711 95639 7e3fe6 95639->95638 95710 801abf 22 API calls 95639->95710 95643 7acebf 95642->95643 95644 7aced2 95642->95644 95647 79aceb 23 API calls 95643->95647 95645 7aced7 95644->95645 95646 7acf05 95644->95646 95648 7afddb 22 API calls 95645->95648 95649 79aceb 23 API calls 95646->95649 95650 7acec9 95647->95650 95648->95650 95649->95650 95650->95633 95712 79adf0 95651->95712 95653 79bf9d 95654 79bfa9 95653->95654 95655 7e04b6 95653->95655 95657 7e04c6 95654->95657 95658 79c01e 95654->95658 95730 80359c 82 API calls __wsopen_s 95655->95730 95731 80359c 82 API calls __wsopen_s 95657->95731 95717 79ac91 95658->95717 95661 7e04f5 95664 7e055a 95661->95664 95732 7ad217 349 API calls 95661->95732 95662 79c7da 95668 7afe0b 22 API calls 95662->95668 95663 7f7120 22 API calls 95706 79c039 ISource __fread_nolock 95663->95706 95693 79c603 95664->95693 95733 80359c 82 API calls __wsopen_s 95664->95733 95672 79c808 __fread_nolock 95668->95672 95675 7afe0b 22 API calls 95672->95675 95673 79af8a 22 API calls 95673->95706 95674 7e091a 95742 803209 23 API calls 95674->95742 95707 79c350 ISource __fread_nolock 95675->95707 95678 79ec40 349 API calls 95678->95706 95679 7e08a5 95680 79ec40 349 API calls 95679->95680 95682 7e08cf 95680->95682 95682->95693 95740 79a81b 41 API calls 95682->95740 95683 7e0591 95734 80359c 82 API calls __wsopen_s 95683->95734 95686 7e08f6 95741 80359c 82 API calls __wsopen_s 95686->95741 95689 79c237 95691 79c253 95689->95691 95743 79a8c7 22 API calls __fread_nolock 95689->95743 95690 79aceb 23 API calls 95690->95706 95695 7e0976 95691->95695 95699 79c297 ISource 95691->95699 95693->95638 95694 7afe0b 22 API calls 95694->95706 95698 79aceb 23 API calls 95695->95698 95697 7afddb 22 API calls 95697->95706 95701 7e09bf 95698->95701 95700 79aceb 23 API calls 95699->95700 95699->95701 95702 79c335 95700->95702 95701->95693 95744 80359c 82 API calls __wsopen_s 95701->95744 95702->95701 95703 79c342 95702->95703 95728 79a704 22 API calls ISource 95703->95728 95704 79bbe0 40 API calls 95704->95706 95706->95661 95706->95662 95706->95663 95706->95664 95706->95672 95706->95673 95706->95674 95706->95678 95706->95679 95706->95683 95706->95686 95706->95689 95706->95690 95706->95693 95706->95694 95706->95697 95706->95701 95706->95704 95721 79ad81 95706->95721 95735 7f7099 22 API calls __fread_nolock 95706->95735 95736 815745 54 API calls _wcslen 95706->95736 95737 7aaa42 22 API calls ISource 95706->95737 95738 7ff05c 40 API calls 95706->95738 95739 79a993 41 API calls 95706->95739 95708 79c3ac 95707->95708 95729 7ace17 22 API calls ISource 95707->95729 95708->95638 95709->95639 95710->95635 95711->95640 95713 79ae01 95712->95713 95716 79ae1c ISource 95712->95716 95714 79aec9 22 API calls 95713->95714 95715 79ae09 CharUpperBuffW 95714->95715 95715->95716 95716->95653 95718 79acae 95717->95718 95719 79acd1 95718->95719 95745 80359c 82 API calls __wsopen_s 95718->95745 95719->95706 95722 7dfadb 95721->95722 95723 79ad92 95721->95723 95724 7afddb 22 API calls 95723->95724 95725 79ad99 95724->95725 95746 79adcd 95725->95746 95728->95707 95729->95707 95730->95657 95731->95693 95732->95664 95733->95693 95734->95693 95735->95706 95736->95706 95737->95706 95738->95706 95739->95706 95740->95686 95741->95693 95742->95689 95743->95691 95744->95693 95745->95719 95750 79addd 95746->95750 95747 79adb6 95747->95706 95748 7afddb 22 API calls 95748->95750 95749 79a961 22 API calls 95749->95750 95750->95747 95750->95748 95750->95749 95752 79adcd 22 API calls 95750->95752 95753 79a8c7 22 API calls __fread_nolock 95750->95753 95752->95750 95753->95750 95754 792e37 95755 79a961 22 API calls 95754->95755 95756 792e4d 95755->95756 95833 794ae3 95756->95833 95758 792e6b 95759 793a5a 24 API calls 95758->95759 95760 792e7f 95759->95760 95761 799cb3 22 API calls 95760->95761 95762 792e8c 95761->95762 95847 794ecb 95762->95847 95765 792ead 95869 79a8c7 22 API calls __fread_nolock 95765->95869 95766 7d2cb0 95887 802cf9 95766->95887 95768 7d2cc3 95770 7d2ccf 95768->95770 95913 794f39 95768->95913 95774 794f39 68 API calls 95770->95774 95771 792ec3 95870 796f88 22 API calls 95771->95870 95776 7d2ce5 95774->95776 95775 792ecf 95777 799cb3 22 API calls 95775->95777 95919 793084 22 API calls 95776->95919 95778 792edc 95777->95778 95871 79a81b 41 API calls 95778->95871 95781 792eec 95783 799cb3 22 API calls 95781->95783 95782 7d2d02 95920 793084 22 API calls 95782->95920 95785 792f12 95783->95785 95872 79a81b 41 API calls 95785->95872 95786 7d2d1e 95788 793a5a 24 API calls 95786->95788 95790 7d2d44 95788->95790 95789 792f21 95793 79a961 22 API calls 95789->95793 95921 793084 22 API calls 95790->95921 95792 7d2d50 95922 79a8c7 22 API calls __fread_nolock 95792->95922 95795 792f3f 95793->95795 95873 793084 22 API calls 95795->95873 95796 7d2d5e 95923 793084 22 API calls 95796->95923 95799 792f4b 95874 7b4a28 40 API calls 3 library calls 95799->95874 95801 792f59 95801->95776 95803 792f63 95801->95803 95802 7d2d6d 95924 79a8c7 22 API calls __fread_nolock 95802->95924 95875 7b4a28 40 API calls 3 library calls 95803->95875 95806 7d2d83 95925 793084 22 API calls 95806->95925 95807 792f6e 95807->95782 95809 792f78 95807->95809 95876 7b4a28 40 API calls 3 library calls 95809->95876 95810 7d2d90 95812 792f83 95812->95786 95813 792f8d 95812->95813 95877 7b4a28 40 API calls 3 library calls 95813->95877 95815 792f98 95816 792fdc 95815->95816 95878 793084 22 API calls 95815->95878 95816->95802 95817 792fe8 95816->95817 95817->95810 95881 7963eb 22 API calls 95817->95881 95819 792fbf 95879 79a8c7 22 API calls __fread_nolock 95819->95879 95821 792ff8 95882 796a50 22 API calls 95821->95882 95824 792fcd 95880 793084 22 API calls 95824->95880 95825 793006 95883 7970b0 23 API calls 95825->95883 95830 793021 95831 793065 95830->95831 95884 796f88 22 API calls 95830->95884 95885 7970b0 23 API calls 95830->95885 95886 793084 22 API calls 95830->95886 95834 794af0 __wsopen_s 95833->95834 95835 796b57 22 API calls 95834->95835 95836 794b22 95834->95836 95835->95836 95846 794b58 95836->95846 95926 794c6d 95836->95926 95838 794c6d 22 API calls 95838->95846 95839 799cb3 22 API calls 95841 794c52 95839->95841 95840 799cb3 22 API calls 95840->95846 95842 79515f 22 API calls 95841->95842 95844 794c5e 95842->95844 95843 79515f 22 API calls 95843->95846 95844->95758 95845 794c29 95845->95839 95845->95844 95846->95838 95846->95840 95846->95843 95846->95845 95929 794e90 LoadLibraryA 95847->95929 95852 7d3ccf 95854 794f39 68 API calls 95852->95854 95853 794ef6 LoadLibraryExW 95937 794e59 LoadLibraryA 95853->95937 95856 7d3cd6 95854->95856 95859 794e59 3 API calls 95856->95859 95861 7d3cde 95859->95861 95860 794f20 95860->95861 95862 794f2c 95860->95862 95959 7950f5 95861->95959 95863 794f39 68 API calls 95862->95863 95865 792ea5 95863->95865 95865->95765 95865->95766 95868 7d3d05 95869->95771 95870->95775 95871->95781 95872->95789 95873->95799 95874->95801 95875->95807 95876->95812 95877->95815 95878->95819 95879->95824 95880->95816 95881->95821 95882->95825 95883->95830 95884->95830 95885->95830 95886->95830 95888 802d15 95887->95888 95889 79511f 64 API calls 95888->95889 95890 802d29 95889->95890 96092 802e66 95890->96092 95893 7950f5 40 API calls 95894 802d56 95893->95894 95895 7950f5 40 API calls 95894->95895 95896 802d66 95895->95896 95897 7950f5 40 API calls 95896->95897 95898 802d81 95897->95898 95899 7950f5 40 API calls 95898->95899 95900 802d9c 95899->95900 95901 79511f 64 API calls 95900->95901 95902 802db3 95901->95902 95903 7bea0c ___std_exception_copy 21 API calls 95902->95903 95904 802dba 95903->95904 95905 7bea0c ___std_exception_copy 21 API calls 95904->95905 95906 802dc4 95905->95906 95907 7950f5 40 API calls 95906->95907 95908 802dd8 95907->95908 95909 8028fe 27 API calls 95908->95909 95911 802dee 95909->95911 95910 802d3f 95910->95768 95911->95910 96098 8022ce 79 API calls 95911->96098 95914 794f4a 95913->95914 95915 794f43 95913->95915 95917 794f59 95914->95917 95918 794f6a FreeLibrary 95914->95918 96099 7be678 95915->96099 95917->95770 95918->95917 95919->95782 95920->95786 95921->95792 95922->95796 95923->95802 95924->95806 95925->95810 95927 79aec9 22 API calls 95926->95927 95928 794c78 95927->95928 95928->95836 95930 794ea8 GetProcAddress 95929->95930 95931 794ec6 95929->95931 95932 794eb8 95930->95932 95934 7be5eb 95931->95934 95932->95931 95933 794ebf FreeLibrary 95932->95933 95933->95931 95967 7be52a 95934->95967 95936 794eea 95936->95852 95936->95853 95938 794e8d 95937->95938 95939 794e6e GetProcAddress 95937->95939 95942 794f80 95938->95942 95940 794e7e 95939->95940 95940->95938 95941 794e86 FreeLibrary 95940->95941 95941->95938 95943 7afe0b 22 API calls 95942->95943 95944 794f95 95943->95944 95945 795722 22 API calls 95944->95945 95946 794fa1 __fread_nolock 95945->95946 95947 7d3d1d 95946->95947 95948 7950a5 95946->95948 95953 794fdc 95946->95953 96032 80304d 74 API calls 95947->96032 96021 7942a2 CreateStreamOnHGlobal 95948->96021 95951 7d3d22 95954 79511f 64 API calls 95951->95954 95952 7950f5 40 API calls 95952->95953 95953->95951 95953->95952 95958 79506e ISource 95953->95958 96027 79511f 95953->96027 95955 7d3d45 95954->95955 95956 7950f5 40 API calls 95955->95956 95956->95958 95958->95860 95960 7d3d70 95959->95960 95961 795107 95959->95961 96054 7be8c4 95961->96054 95964 8028fe 96075 80274e 95964->96075 95966 802919 95966->95868 95970 7be536 BuildCatchObjectHelperInternal 95967->95970 95968 7be544 95992 7bf2d9 20 API calls _abort 95968->95992 95970->95968 95972 7be574 95970->95972 95971 7be549 95993 7c27ec 26 API calls _abort 95971->95993 95974 7be579 95972->95974 95975 7be586 95972->95975 95994 7bf2d9 20 API calls _abort 95974->95994 95984 7c8061 95975->95984 95978 7be58f 95979 7be595 95978->95979 95981 7be5a2 95978->95981 95995 7bf2d9 20 API calls _abort 95979->95995 95996 7be5d4 LeaveCriticalSection __fread_nolock 95981->95996 95983 7be554 __wsopen_s 95983->95936 95985 7c806d BuildCatchObjectHelperInternal 95984->95985 95997 7c2f5e EnterCriticalSection 95985->95997 95987 7c807b 95998 7c80fb 95987->95998 95991 7c80ac __wsopen_s 95991->95978 95992->95971 95993->95983 95994->95983 95995->95983 95996->95983 95997->95987 96005 7c811e 95998->96005 95999 7c8177 96017 7c4c7d 20 API calls 2 library calls 95999->96017 96001 7c8180 96003 7c29c8 _free 20 API calls 96001->96003 96004 7c8189 96003->96004 96007 7c8088 96004->96007 96018 7c3405 11 API calls 2 library calls 96004->96018 96005->95999 96005->96005 96005->96007 96015 7b918d EnterCriticalSection 96005->96015 96016 7b91a1 LeaveCriticalSection 96005->96016 96012 7c80b7 96007->96012 96008 7c81a8 96019 7b918d EnterCriticalSection 96008->96019 96011 7c81bb 96011->96007 96020 7c2fa6 LeaveCriticalSection 96012->96020 96014 7c80be 96014->95991 96015->96005 96016->96005 96017->96001 96018->96008 96019->96011 96020->96014 96022 7942d9 96021->96022 96023 7942bc FindResourceExW 96021->96023 96022->95953 96023->96022 96024 7d35ba LoadResource 96023->96024 96024->96022 96025 7d35cf SizeofResource 96024->96025 96025->96022 96026 7d35e3 LockResource 96025->96026 96026->96022 96028 79512e 96027->96028 96029 7d3d90 96027->96029 96033 7bece3 96028->96033 96032->95951 96036 7beaaa 96033->96036 96035 79513c 96035->95953 96039 7beab6 BuildCatchObjectHelperInternal 96036->96039 96037 7beac2 96049 7bf2d9 20 API calls _abort 96037->96049 96038 7beae8 96051 7b918d EnterCriticalSection 96038->96051 96039->96037 96039->96038 96042 7beac7 96050 7c27ec 26 API calls _abort 96042->96050 96043 7beaf4 96052 7bec0a 62 API calls 2 library calls 96043->96052 96046 7beb08 96053 7beb27 LeaveCriticalSection __fread_nolock 96046->96053 96048 7bead2 __wsopen_s 96048->96035 96049->96042 96050->96048 96051->96043 96052->96046 96053->96048 96057 7be8e1 96054->96057 96056 795118 96056->95964 96058 7be8ed BuildCatchObjectHelperInternal 96057->96058 96059 7be92d 96058->96059 96060 7be900 ___scrt_fastfail 96058->96060 96061 7be925 __wsopen_s 96058->96061 96072 7b918d EnterCriticalSection 96059->96072 96070 7bf2d9 20 API calls _abort 96060->96070 96061->96056 96063 7be937 96073 7be6f8 38 API calls 4 library calls 96063->96073 96065 7be91a 96071 7c27ec 26 API calls _abort 96065->96071 96068 7be94e 96074 7be96c LeaveCriticalSection __fread_nolock 96068->96074 96070->96065 96071->96061 96072->96063 96073->96068 96074->96061 96078 7be4e8 96075->96078 96077 80275d 96077->95966 96081 7be469 96078->96081 96080 7be505 96080->96077 96082 7be478 96081->96082 96083 7be48c 96081->96083 96089 7bf2d9 20 API calls _abort 96082->96089 96088 7be488 __alldvrm 96083->96088 96091 7c333f 11 API calls 2 library calls 96083->96091 96085 7be47d 96090 7c27ec 26 API calls _abort 96085->96090 96088->96080 96089->96085 96090->96088 96091->96088 96096 802e7a 96092->96096 96093 7950f5 40 API calls 96093->96096 96094 8028fe 27 API calls 96094->96096 96095 802d3b 96095->95893 96095->95910 96096->96093 96096->96094 96096->96095 96097 79511f 64 API calls 96096->96097 96097->96096 96098->95910 96100 7be684 BuildCatchObjectHelperInternal 96099->96100 96101 7be6aa 96100->96101 96102 7be695 96100->96102 96110 7be6a5 __wsopen_s 96101->96110 96112 7b918d EnterCriticalSection 96101->96112 96129 7bf2d9 20 API calls _abort 96102->96129 96104 7be69a 96130 7c27ec 26 API calls _abort 96104->96130 96106 7be6c6 96113 7be602 96106->96113 96109 7be6d1 96131 7be6ee LeaveCriticalSection __fread_nolock 96109->96131 96110->95914 96112->96106 96114 7be60f 96113->96114 96115 7be624 96113->96115 96164 7bf2d9 20 API calls _abort 96114->96164 96121 7be61f 96115->96121 96132 7bdc0b 96115->96132 96117 7be614 96165 7c27ec 26 API calls _abort 96117->96165 96121->96109 96125 7be646 96149 7c862f 96125->96149 96128 7c29c8 _free 20 API calls 96128->96121 96129->96104 96130->96110 96131->96110 96133 7bdc1f 96132->96133 96134 7bdc23 96132->96134 96138 7c4d7a 96133->96138 96134->96133 96135 7bd955 __fread_nolock 26 API calls 96134->96135 96136 7bdc43 96135->96136 96166 7c59be 62 API calls 4 library calls 96136->96166 96139 7be640 96138->96139 96140 7c4d90 96138->96140 96142 7bd955 96139->96142 96140->96139 96141 7c29c8 _free 20 API calls 96140->96141 96141->96139 96143 7bd961 96142->96143 96144 7bd976 96142->96144 96167 7bf2d9 20 API calls _abort 96143->96167 96144->96125 96146 7bd966 96168 7c27ec 26 API calls _abort 96146->96168 96148 7bd971 96148->96125 96150 7c863e 96149->96150 96151 7c8653 96149->96151 96172 7bf2c6 20 API calls _abort 96150->96172 96153 7c868e 96151->96153 96158 7c867a 96151->96158 96174 7bf2c6 20 API calls _abort 96153->96174 96155 7c8643 96173 7bf2d9 20 API calls _abort 96155->96173 96156 7c8693 96175 7bf2d9 20 API calls _abort 96156->96175 96169 7c8607 96158->96169 96161 7be64c 96161->96121 96161->96128 96162 7c869b 96176 7c27ec 26 API calls _abort 96162->96176 96164->96117 96165->96121 96166->96133 96167->96146 96168->96148 96177 7c8585 96169->96177 96171 7c862b 96171->96161 96172->96155 96173->96161 96174->96156 96175->96162 96176->96161 96178 7c8591 BuildCatchObjectHelperInternal 96177->96178 96188 7c5147 EnterCriticalSection 96178->96188 96180 7c859f 96181 7c85c6 96180->96181 96182 7c85d1 96180->96182 96189 7c86ae 96181->96189 96204 7bf2d9 20 API calls _abort 96182->96204 96185 7c85cc 96205 7c85fb LeaveCriticalSection __wsopen_s 96185->96205 96187 7c85ee __wsopen_s 96187->96171 96188->96180 96206 7c53c4 96189->96206 96191 7c86c4 96219 7c5333 21 API calls 2 library calls 96191->96219 96192 7c86be 96192->96191 96194 7c86f6 96192->96194 96197 7c53c4 __wsopen_s 26 API calls 96192->96197 96194->96191 96195 7c53c4 __wsopen_s 26 API calls 96194->96195 96198 7c8702 CloseHandle 96195->96198 96196 7c871c 96199 7c873e 96196->96199 96220 7bf2a3 20 API calls __dosmaperr 96196->96220 96200 7c86ed 96197->96200 96198->96191 96201 7c870e GetLastError 96198->96201 96199->96185 96203 7c53c4 __wsopen_s 26 API calls 96200->96203 96201->96191 96203->96194 96204->96185 96205->96187 96207 7c53e6 96206->96207 96208 7c53d1 96206->96208 96213 7c540b 96207->96213 96223 7bf2c6 20 API calls _abort 96207->96223 96221 7bf2c6 20 API calls _abort 96208->96221 96210 7c53d6 96222 7bf2d9 20 API calls _abort 96210->96222 96213->96192 96214 7c5416 96224 7bf2d9 20 API calls _abort 96214->96224 96215 7c53de 96215->96192 96217 7c541e 96225 7c27ec 26 API calls _abort 96217->96225 96219->96196 96220->96199 96221->96210 96222->96215 96223->96214 96224->96217 96225->96215 96226 793156 96229 793170 96226->96229 96230 793187 96229->96230 96231 7931eb 96230->96231 96232 79318c 96230->96232 96273 7931e9 96230->96273 96234 7d2dfb 96231->96234 96235 7931f1 96231->96235 96236 793199 96232->96236 96237 793265 PostQuitMessage 96232->96237 96233 7931d0 DefWindowProcW 96243 79316a 96233->96243 96288 7918e2 10 API calls 96234->96288 96238 7931f8 96235->96238 96239 79321d SetTimer RegisterWindowMessageW 96235->96239 96241 7d2e7c 96236->96241 96242 7931a4 96236->96242 96237->96243 96244 7d2d9c 96238->96244 96245 793201 KillTimer 96238->96245 96239->96243 96247 793246 CreatePopupMenu 96239->96247 96301 7fbf30 34 API calls ___scrt_fastfail 96241->96301 96248 7d2e68 96242->96248 96249 7931ae 96242->96249 96257 7d2dd7 MoveWindow 96244->96257 96258 7d2da1 96244->96258 96274 7930f2 96245->96274 96246 7d2e1c 96289 7ae499 42 API calls 96246->96289 96247->96243 96278 7fc161 96248->96278 96254 7d2e4d 96249->96254 96255 7931b9 96249->96255 96254->96233 96300 7f0ad7 22 API calls 96254->96300 96262 7931c4 96255->96262 96263 793253 96255->96263 96256 7d2e8e 96256->96233 96256->96243 96257->96243 96259 7d2da7 96258->96259 96260 7d2dc6 SetFocus 96258->96260 96259->96262 96264 7d2db0 96259->96264 96260->96243 96262->96233 96270 7930f2 Shell_NotifyIconW 96262->96270 96286 79326f 44 API calls ___scrt_fastfail 96263->96286 96287 7918e2 10 API calls 96264->96287 96269 793263 96269->96243 96271 7d2e41 96270->96271 96290 793837 96271->96290 96273->96233 96275 793154 96274->96275 96276 793104 ___scrt_fastfail 96274->96276 96285 793c50 DeleteObject DestroyWindow 96275->96285 96277 793123 Shell_NotifyIconW 96276->96277 96277->96275 96279 7fc179 ___scrt_fastfail 96278->96279 96280 7fc276 96278->96280 96302 793923 96279->96302 96280->96243 96282 7fc25f KillTimer SetTimer 96282->96280 96283 7fc1a0 96283->96282 96284 7fc251 Shell_NotifyIconW 96283->96284 96284->96282 96285->96243 96286->96269 96287->96243 96288->96246 96289->96262 96291 793862 ___scrt_fastfail 96290->96291 96332 794212 96291->96332 96293 7938e8 96296 7d3386 Shell_NotifyIconW 96293->96296 96297 793906 Shell_NotifyIconW 96293->96297 96298 793923 24 API calls 96297->96298 96299 79391c 96298->96299 96299->96273 96300->96273 96301->96256 96303 79393f 96302->96303 96304 793a13 96302->96304 96324 796270 96303->96324 96304->96283 96307 79395a 96309 796b57 22 API calls 96307->96309 96308 7d3393 LoadStringW 96310 7d33ad 96308->96310 96311 79396f 96309->96311 96318 793994 ___scrt_fastfail 96310->96318 96330 79a8c7 22 API calls __fread_nolock 96310->96330 96312 7d33c9 96311->96312 96313 79397c 96311->96313 96331 796350 22 API calls 96312->96331 96313->96310 96315 793986 96313->96315 96329 796350 22 API calls 96315->96329 96321 7939f9 Shell_NotifyIconW 96318->96321 96319 7d33d7 96319->96318 96320 7933c6 22 API calls 96319->96320 96322 7d33f9 96320->96322 96321->96304 96323 7933c6 22 API calls 96322->96323 96323->96318 96325 7afe0b 22 API calls 96324->96325 96326 796295 96325->96326 96327 7afddb 22 API calls 96326->96327 96328 79394d 96327->96328 96328->96307 96328->96308 96329->96318 96330->96318 96331->96319 96333 7d35a4 96332->96333 96334 7938b7 96332->96334 96333->96334 96335 7d35ad DestroyIcon 96333->96335 96334->96293 96336 7fc874 42 API calls _strftime 96334->96336 96335->96334 96336->96293 96337 791cad SystemParametersInfoW 96338 822a55 96346 801ebc 96338->96346 96341 822a70 96348 7f39c0 22 API calls 96341->96348 96343 822a7c 96349 7f417d 22 API calls __fread_nolock 96343->96349 96345 822a87 96347 801ec3 IsWindow 96346->96347 96347->96341 96347->96345 96348->96343 96349->96345 96350 7d2ba5 96351 7d2baf 96350->96351 96352 792b25 96350->96352 96354 793a5a 24 API calls 96351->96354 96378 792b83 7 API calls 96352->96378 96356 7d2bb8 96354->96356 96358 799cb3 22 API calls 96356->96358 96360 7d2bc6 96358->96360 96359 792b2f 96361 792b44 96359->96361 96365 793837 49 API calls 96359->96365 96362 7d2bce 96360->96362 96363 7d2bf5 96360->96363 96369 792b5f 96361->96369 96372 7930f2 Shell_NotifyIconW 96361->96372 96366 7933c6 22 API calls 96362->96366 96364 7933c6 22 API calls 96363->96364 96377 7d2bf1 GetForegroundWindow ShellExecuteW 96364->96377 96365->96361 96367 7d2bd9 96366->96367 96382 796350 22 API calls 96367->96382 96375 792b66 SetCurrentDirectoryW 96369->96375 96371 7d2c26 96371->96369 96372->96369 96373 7d2be7 96374 7933c6 22 API calls 96373->96374 96374->96377 96376 792b7a 96375->96376 96377->96371 96383 792cd4 7 API calls 96378->96383 96380 792b2a 96381 792c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 96380->96381 96381->96359 96382->96373 96383->96380 96384 792de3 96385 792df0 __wsopen_s 96384->96385 96386 792e09 96385->96386 96387 7d2c2b ___scrt_fastfail 96385->96387 96388 793aa2 23 API calls 96386->96388 96390 7d2c47 GetOpenFileNameW 96387->96390 96389 792e12 96388->96389 96400 792da5 96389->96400 96392 7d2c96 96390->96392 96393 796b57 22 API calls 96392->96393 96395 7d2cab 96393->96395 96395->96395 96397 792e27 96418 7944a8 96397->96418 96401 7d1f50 __wsopen_s 96400->96401 96402 792db2 GetLongPathNameW 96401->96402 96403 796b57 22 API calls 96402->96403 96404 792dda 96403->96404 96405 793598 96404->96405 96406 79a961 22 API calls 96405->96406 96407 7935aa 96406->96407 96408 793aa2 23 API calls 96407->96408 96409 7935b5 96408->96409 96410 7935c0 96409->96410 96415 7d32eb 96409->96415 96412 79515f 22 API calls 96410->96412 96413 7935cc 96412->96413 96447 7935f3 96413->96447 96416 7d330d 96415->96416 96453 7ace60 41 API calls 96415->96453 96417 7935df 96417->96397 96419 794ecb 94 API calls 96418->96419 96420 7944cd 96419->96420 96421 7d3833 96420->96421 96422 794ecb 94 API calls 96420->96422 96423 802cf9 80 API calls 96421->96423 96424 7944e1 96422->96424 96425 7d3848 96423->96425 96424->96421 96428 7944e9 96424->96428 96426 7d384c 96425->96426 96427 7d3869 96425->96427 96429 794f39 68 API calls 96426->96429 96430 7afe0b 22 API calls 96427->96430 96431 7d3854 96428->96431 96432 7944f5 96428->96432 96429->96431 96444 7d38ae 96430->96444 96455 7fda5a 82 API calls 96431->96455 96454 79940c 136 API calls 2 library calls 96432->96454 96435 7d3862 96435->96427 96436 792e31 96437 794f39 68 API calls 96440 7d3a5f 96437->96440 96440->96437 96461 7f989b 82 API calls __wsopen_s 96440->96461 96443 799cb3 22 API calls 96443->96444 96444->96440 96444->96443 96456 7f967e 22 API calls __fread_nolock 96444->96456 96457 7f95ad 42 API calls _wcslen 96444->96457 96458 800b5a 22 API calls 96444->96458 96459 79a4a1 22 API calls __fread_nolock 96444->96459 96460 793ff7 22 API calls 96444->96460 96448 793605 96447->96448 96452 793624 __fread_nolock 96447->96452 96451 7afe0b 22 API calls 96448->96451 96449 7afddb 22 API calls 96450 79363b 96449->96450 96450->96417 96451->96452 96452->96449 96453->96415 96454->96436 96455->96435 96456->96444 96457->96444 96458->96444 96459->96444 96460->96444 96461->96440 96462 791044 96467 7910f3 96462->96467 96464 79104a 96503 7b00a3 29 API calls __onexit 96464->96503 96466 791054 96504 791398 96467->96504 96471 79116a 96472 79a961 22 API calls 96471->96472 96473 791174 96472->96473 96474 79a961 22 API calls 96473->96474 96475 79117e 96474->96475 96476 79a961 22 API calls 96475->96476 96477 791188 96476->96477 96478 79a961 22 API calls 96477->96478 96479 7911c6 96478->96479 96480 79a961 22 API calls 96479->96480 96481 791292 96480->96481 96514 79171c 96481->96514 96485 7912c4 96486 79a961 22 API calls 96485->96486 96487 7912ce 96486->96487 96488 7a1940 9 API calls 96487->96488 96489 7912f9 96488->96489 96535 791aab 96489->96535 96491 791315 96492 791325 GetStdHandle 96491->96492 96493 79137a 96492->96493 96494 7d2485 96492->96494 96498 791387 OleInitialize 96493->96498 96494->96493 96495 7d248e 96494->96495 96496 7afddb 22 API calls 96495->96496 96497 7d2495 96496->96497 96542 80011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 96497->96542 96498->96464 96500 7d249e 96543 800944 CreateThread 96500->96543 96502 7d24aa CloseHandle 96502->96493 96503->96466 96544 7913f1 96504->96544 96507 7913f1 22 API calls 96508 7913d0 96507->96508 96509 79a961 22 API calls 96508->96509 96510 7913dc 96509->96510 96511 796b57 22 API calls 96510->96511 96512 791129 96511->96512 96513 791bc3 6 API calls 96512->96513 96513->96471 96515 79a961 22 API calls 96514->96515 96516 79172c 96515->96516 96517 79a961 22 API calls 96516->96517 96518 791734 96517->96518 96519 79a961 22 API calls 96518->96519 96520 79174f 96519->96520 96521 7afddb 22 API calls 96520->96521 96522 79129c 96521->96522 96523 791b4a 96522->96523 96524 791b58 96523->96524 96525 79a961 22 API calls 96524->96525 96526 791b63 96525->96526 96527 79a961 22 API calls 96526->96527 96528 791b6e 96527->96528 96529 79a961 22 API calls 96528->96529 96530 791b79 96529->96530 96531 79a961 22 API calls 96530->96531 96532 791b84 96531->96532 96533 7afddb 22 API calls 96532->96533 96534 791b96 RegisterWindowMessageW 96533->96534 96534->96485 96536 7d272d 96535->96536 96537 791abb 96535->96537 96551 803209 23 API calls 96536->96551 96538 7afddb 22 API calls 96537->96538 96541 791ac3 96538->96541 96540 7d2738 96541->96491 96542->96500 96543->96502 96552 80092a 28 API calls 96543->96552 96545 79a961 22 API calls 96544->96545 96546 7913fc 96545->96546 96547 79a961 22 API calls 96546->96547 96548 791404 96547->96548 96549 79a961 22 API calls 96548->96549 96550 7913c6 96549->96550 96550->96507 96551->96540 96553 7c8402 96558 7c81be 96553->96558 96556 7c842a 96563 7c81ef try_get_first_available_module 96558->96563 96560 7c83ee 96577 7c27ec 26 API calls _abort 96560->96577 96562 7c8343 96562->96556 96570 7d0984 96562->96570 96569 7c8338 96563->96569 96573 7b8e0b 40 API calls 2 library calls 96563->96573 96565 7c838c 96565->96569 96574 7b8e0b 40 API calls 2 library calls 96565->96574 96567 7c83ab 96567->96569 96575 7b8e0b 40 API calls 2 library calls 96567->96575 96569->96562 96576 7bf2d9 20 API calls _abort 96569->96576 96578 7d0081 96570->96578 96572 7d099f 96572->96556 96573->96565 96574->96567 96575->96569 96576->96560 96577->96562 96580 7d008d BuildCatchObjectHelperInternal 96578->96580 96579 7d009b 96636 7bf2d9 20 API calls _abort 96579->96636 96580->96579 96582 7d00d4 96580->96582 96589 7d065b 96582->96589 96583 7d00a0 96637 7c27ec 26 API calls _abort 96583->96637 96587 7d00aa __wsopen_s 96587->96572 96639 7d042f 96589->96639 96592 7d068d 96671 7bf2c6 20 API calls _abort 96592->96671 96593 7d06a6 96657 7c5221 96593->96657 96596 7d0692 96672 7bf2d9 20 API calls _abort 96596->96672 96597 7d06ab 96598 7d06cb 96597->96598 96599 7d06b4 96597->96599 96670 7d039a CreateFileW 96598->96670 96673 7bf2c6 20 API calls _abort 96599->96673 96603 7d00f8 96638 7d0121 LeaveCriticalSection __wsopen_s 96603->96638 96604 7d06b9 96674 7bf2d9 20 API calls _abort 96604->96674 96605 7d0781 GetFileType 96608 7d078c GetLastError 96605->96608 96609 7d07d3 96605->96609 96607 7d0756 GetLastError 96676 7bf2a3 20 API calls __dosmaperr 96607->96676 96677 7bf2a3 20 API calls __dosmaperr 96608->96677 96679 7c516a 21 API calls 2 library calls 96609->96679 96610 7d0704 96610->96605 96610->96607 96675 7d039a CreateFileW 96610->96675 96614 7d079a CloseHandle 96614->96596 96615 7d07c3 96614->96615 96678 7bf2d9 20 API calls _abort 96615->96678 96617 7d0749 96617->96605 96617->96607 96619 7d07f4 96621 7d0840 96619->96621 96680 7d05ab 72 API calls 3 library calls 96619->96680 96620 7d07c8 96620->96596 96625 7d086d 96621->96625 96681 7d014d 72 API calls 4 library calls 96621->96681 96624 7d0866 96624->96625 96627 7d087e 96624->96627 96626 7c86ae __wsopen_s 29 API calls 96625->96626 96626->96603 96627->96603 96628 7d08fc CloseHandle 96627->96628 96682 7d039a CreateFileW 96628->96682 96630 7d0927 96631 7d0931 GetLastError 96630->96631 96632 7d095d 96630->96632 96683 7bf2a3 20 API calls __dosmaperr 96631->96683 96632->96603 96634 7d093d 96684 7c5333 21 API calls 2 library calls 96634->96684 96636->96583 96637->96587 96638->96587 96640 7d046a 96639->96640 96641 7d0450 96639->96641 96685 7d03bf 96640->96685 96641->96640 96692 7bf2d9 20 API calls _abort 96641->96692 96644 7d045f 96693 7c27ec 26 API calls _abort 96644->96693 96646 7d04a2 96647 7d04d1 96646->96647 96694 7bf2d9 20 API calls _abort 96646->96694 96655 7d0524 96647->96655 96696 7bd70d 26 API calls 2 library calls 96647->96696 96650 7d051f 96652 7d059e 96650->96652 96650->96655 96651 7d04c6 96695 7c27ec 26 API calls _abort 96651->96695 96697 7c27fc 11 API calls _abort 96652->96697 96655->96592 96655->96593 96656 7d05aa 96658 7c522d BuildCatchObjectHelperInternal 96657->96658 96700 7c2f5e EnterCriticalSection 96658->96700 96660 7c5259 96704 7c5000 21 API calls 3 library calls 96660->96704 96663 7c5234 96663->96660 96666 7c52c7 EnterCriticalSection 96663->96666 96668 7c527b 96663->96668 96664 7c525e 96664->96668 96705 7c5147 EnterCriticalSection 96664->96705 96665 7c52a4 __wsopen_s 96665->96597 96667 7c52d4 LeaveCriticalSection 96666->96667 96666->96668 96667->96663 96701 7c532a 96668->96701 96670->96610 96671->96596 96672->96603 96673->96604 96674->96596 96675->96617 96676->96596 96677->96614 96678->96620 96679->96619 96680->96621 96681->96624 96682->96630 96683->96634 96684->96632 96688 7d03d7 96685->96688 96686 7d03f2 96686->96646 96688->96686 96698 7bf2d9 20 API calls _abort 96688->96698 96689 7d0416 96699 7c27ec 26 API calls _abort 96689->96699 96691 7d0421 96691->96646 96692->96644 96693->96640 96694->96651 96695->96647 96696->96650 96697->96656 96698->96689 96699->96691 96700->96663 96706 7c2fa6 LeaveCriticalSection 96701->96706 96703 7c5331 96703->96665 96704->96664 96705->96668 96706->96703 96707 7e2a00 96723 79d7b0 ISource 96707->96723 96708 79db11 PeekMessageW 96708->96723 96709 79d807 GetInputState 96709->96708 96709->96723 96710 7e1cbe TranslateAcceleratorW 96710->96723 96712 79db8f PeekMessageW 96712->96723 96713 79da04 timeGetTime 96713->96723 96714 79db73 TranslateMessage DispatchMessageW 96714->96712 96715 79dbaf Sleep 96715->96723 96716 7e2b74 Sleep 96729 7e2b85 96716->96729 96718 7e1dda timeGetTime 96763 7ae300 23 API calls 96718->96763 96720 7fd4dc 47 API calls 96720->96729 96722 7e2c0b GetExitCodeProcess 96724 7e2c37 CloseHandle 96722->96724 96725 7e2c21 WaitForSingleObject 96722->96725 96723->96708 96723->96709 96723->96710 96723->96712 96723->96713 96723->96714 96723->96715 96723->96716 96723->96718 96726 79d9d5 96723->96726 96727 8229bf GetForegroundWindow 96723->96727 96735 79ec40 349 API calls 96723->96735 96736 7a1310 349 API calls 96723->96736 96737 79bf40 349 API calls 96723->96737 96739 79dd50 96723->96739 96746 7aedf6 96723->96746 96751 7fe97b 96723->96751 96761 79dfd0 349 API calls 3 library calls 96723->96761 96762 7ae551 timeGetTime 96723->96762 96764 803a2a 23 API calls 96723->96764 96765 80359c 82 API calls __wsopen_s 96723->96765 96766 815658 23 API calls 96723->96766 96724->96729 96725->96723 96725->96724 96727->96723 96729->96720 96729->96722 96729->96723 96729->96726 96730 7e2ca9 Sleep 96729->96730 96767 7ae551 timeGetTime 96729->96767 96730->96723 96735->96723 96736->96723 96737->96723 96740 79dd6f 96739->96740 96741 79dd83 96739->96741 96768 79d260 96740->96768 96800 80359c 82 API calls __wsopen_s 96741->96800 96744 79dd7a 96744->96723 96745 7e2f75 96745->96745 96747 7aee09 96746->96747 96748 7aee12 96746->96748 96747->96723 96748->96747 96749 7aee36 IsDialogMessageW 96748->96749 96750 7eefaf GetClassLongW 96748->96750 96749->96747 96749->96748 96750->96748 96750->96749 96752 7fe9f9 96751->96752 96753 7fe988 96751->96753 96752->96723 96754 7fe98a Sleep 96753->96754 96755 7fe993 QueryPerformanceCounter 96753->96755 96754->96752 96755->96754 96757 7fe9a1 QueryPerformanceFrequency 96755->96757 96758 7fe9ab Sleep QueryPerformanceCounter 96757->96758 96759 7fe9ec 96758->96759 96759->96758 96760 7fe9f0 96759->96760 96760->96752 96761->96723 96762->96723 96763->96723 96764->96723 96765->96723 96766->96723 96767->96729 96769 79ec40 349 API calls 96768->96769 96788 79d29d 96769->96788 96770 7e1bc4 96806 80359c 82 API calls __wsopen_s 96770->96806 96772 79d30b ISource 96772->96744 96773 79d6d5 96773->96772 96783 7afe0b 22 API calls 96773->96783 96774 79d3c3 96774->96773 96776 79d3ce 96774->96776 96775 79d5ff 96777 7e1bb5 96775->96777 96778 79d614 96775->96778 96780 7afddb 22 API calls 96776->96780 96805 815705 23 API calls 96777->96805 96782 7afddb 22 API calls 96778->96782 96779 79d4b8 96784 7afe0b 22 API calls 96779->96784 96789 79d3d5 __fread_nolock 96780->96789 96794 79d46a 96782->96794 96783->96789 96792 79d429 ISource __fread_nolock 96784->96792 96785 7afddb 22 API calls 96787 79d3f6 96785->96787 96786 7afddb 22 API calls 96786->96788 96787->96792 96801 79bec0 349 API calls 96787->96801 96788->96770 96788->96772 96788->96773 96788->96774 96788->96779 96788->96786 96788->96792 96789->96785 96789->96787 96791 7e1ba4 96804 80359c 82 API calls __wsopen_s 96791->96804 96792->96775 96792->96791 96792->96794 96795 791f6f 349 API calls 96792->96795 96796 7e1b7f 96792->96796 96798 7e1b5d 96792->96798 96794->96744 96795->96792 96803 80359c 82 API calls __wsopen_s 96796->96803 96802 80359c 82 API calls __wsopen_s 96798->96802 96800->96745 96801->96792 96802->96794 96803->96794 96804->96794 96805->96770 96806->96772 96807 7d2402 96810 791410 96807->96810 96811 7d24b8 DestroyWindow 96810->96811 96812 79144f mciSendStringW 96810->96812 96825 7d24c4 96811->96825 96813 79146b 96812->96813 96814 7916c6 96812->96814 96815 791479 96813->96815 96813->96825 96814->96813 96816 7916d5 UnregisterHotKey 96814->96816 96843 79182e 96815->96843 96816->96814 96819 7d2509 96824 7d252d 96819->96824 96826 7d251c FreeLibrary 96819->96826 96820 7d24d8 96820->96825 96849 796246 CloseHandle 96820->96849 96821 7d24e2 FindClose 96821->96825 96823 79148e 96823->96824 96832 79149c 96823->96832 96827 7d2541 VirtualFree 96824->96827 96834 791509 96824->96834 96825->96819 96825->96820 96825->96821 96826->96819 96827->96824 96828 7914f8 CoUninitialize 96828->96834 96829 7d2589 96836 7d2598 ISource 96829->96836 96850 8032eb 6 API calls ISource 96829->96850 96830 791514 96831 791524 96830->96831 96847 791944 VirtualFreeEx CloseHandle 96831->96847 96832->96828 96834->96829 96834->96830 96839 7d2627 96836->96839 96851 7f64d4 22 API calls ISource 96836->96851 96838 79153a 96838->96836 96840 79161f 96838->96840 96839->96839 96840->96839 96848 791876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 96840->96848 96842 7916c1 96844 79183b 96843->96844 96845 791480 96844->96845 96852 7f702a 22 API calls 96844->96852 96845->96819 96845->96823 96847->96838 96848->96842 96849->96820 96850->96829 96851->96836 96852->96844

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 400 7942de-79434d call 79a961 GetVersionExW call 796b57 405 7d3617-7d362a 400->405 406 794353 400->406 407 7d362b-7d362f 405->407 408 794355-794357 406->408 409 7d3631 407->409 410 7d3632-7d363e 407->410 411 79435d-7943bc call 7993b2 call 7937a0 408->411 412 7d3656 408->412 409->410 410->407 413 7d3640-7d3642 410->413 426 7d37df-7d37e6 411->426 427 7943c2-7943c4 411->427 416 7d365d-7d3660 412->416 413->408 415 7d3648-7d364f 413->415 415->405 418 7d3651 415->418 419 79441b-794435 GetCurrentProcess IsWow64Process 416->419 420 7d3666-7d36a8 416->420 418->412 423 794494-79449a 419->423 424 794437 419->424 420->419 425 7d36ae-7d36b1 420->425 428 79443d-794449 423->428 424->428 429 7d36db-7d36e5 425->429 430 7d36b3-7d36bd 425->430 434 7d37e8 426->434 435 7d3806-7d3809 426->435 427->416 433 7943ca-7943dd 427->433 438 79444f-79445e LoadLibraryA 428->438 439 7d3824-7d3828 GetSystemInfo 428->439 436 7d36f8-7d3702 429->436 437 7d36e7-7d36f3 429->437 431 7d36bf-7d36c5 430->431 432 7d36ca-7d36d6 430->432 431->419 432->419 440 7943e3-7943e5 433->440 441 7d3726-7d372f 433->441 442 7d37ee 434->442 445 7d380b-7d381a 435->445 446 7d37f4-7d37fc 435->446 443 7d3715-7d3721 436->443 444 7d3704-7d3710 436->444 437->419 447 79449c-7944a6 GetSystemInfo 438->447 448 794460-79446e GetProcAddress 438->448 450 7d374d-7d3762 440->450 451 7943eb-7943ee 440->451 452 7d373c-7d3748 441->452 453 7d3731-7d3737 441->453 442->446 443->419 444->419 445->442 454 7d381c-7d3822 445->454 446->435 449 794476-794478 447->449 448->447 455 794470-794474 GetNativeSystemInfo 448->455 460 79447a-79447b FreeLibrary 449->460 461 794481-794493 449->461 458 7d376f-7d377b 450->458 459 7d3764-7d376a 450->459 456 7d3791-7d3794 451->456 457 7943f4-79440f 451->457 452->419 453->419 454->446 455->449 456->419 464 7d379a-7d37c1 456->464 462 794415 457->462 463 7d3780-7d378c 457->463 458->419 459->419 460->461 462->419 463->419 465 7d37ce-7d37da 464->465 466 7d37c3-7d37c9 464->466 465->419 466->419
                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 0079430D
                                                            • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                          • GetCurrentProcess.KERNEL32(?,0082CB64,00000000,?,?), ref: 00794422
                                                          • IsWow64Process.KERNEL32(00000000,?,?), ref: 00794429
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00794454
                                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00794466
                                                          • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00794474
                                                          • FreeLibrary.KERNEL32(00000000,?,?), ref: 0079447B
                                                          • GetSystemInfo.KERNEL32(?,?,?), ref: 007944A0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                          • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                          • API String ID: 3290436268-3101561225
                                                          • Opcode ID: 2228f5b7b828b149cff7f3c8b2499314bc9c8ed214828699881e29244aa9ffe6
                                                          • Instruction ID: 935d42eda8074b7b9355b454a01aaabd4ec989fa7af42986b73f2fb7e7bcab03
                                                          • Opcode Fuzzy Hash: 2228f5b7b828b149cff7f3c8b2499314bc9c8ed214828699881e29244aa9ffe6
                                                          • Instruction Fuzzy Hash: C8A1957590A2C0DFCF11CB797E896AA7FB57B36300B1E6499D04393B23D6AC4509CB62

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 804 7942a2-7942ba CreateStreamOnHGlobal 805 7942da-7942dd 804->805 806 7942bc-7942d3 FindResourceExW 804->806 807 7942d9 806->807 808 7d35ba-7d35c9 LoadResource 806->808 807->805 808->807 809 7d35cf-7d35dd SizeofResource 808->809 809->807 810 7d35e3-7d35ee LockResource 809->810 810->807 811 7d35f4-7d3612 810->811 811->807
                                                          APIs
                                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,007950AA,?,?,00000000,00000000), ref: 007942B2
                                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,007950AA,?,?,00000000,00000000), ref: 007942C9
                                                          • LoadResource.KERNEL32(?,00000000,?,?,007950AA,?,?,00000000,00000000,?,?,?,?,?,?,00794F20), ref: 007D35BE
                                                          • SizeofResource.KERNEL32(?,00000000,?,?,007950AA,?,?,00000000,00000000,?,?,?,?,?,?,00794F20), ref: 007D35D3
                                                          • LockResource.KERNEL32(007950AA,?,?,007950AA,?,?,00000000,00000000,?,?,?,?,?,?,00794F20,?), ref: 007D35E6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                          • String ID: SCRIPT
                                                          • API String ID: 3051347437-3967369404
                                                          • Opcode ID: df762fc7142339c7c8f76ed7cd9f90705af9451b7ab60a759ab47e22ca71a3d1
                                                          • Instruction ID: 10dc61bd9401ea3704bbcba36bd53c346990acf38339ccb6d1e52d825f8aea60
                                                          • Opcode Fuzzy Hash: df762fc7142339c7c8f76ed7cd9f90705af9451b7ab60a759ab47e22ca71a3d1
                                                          • Instruction Fuzzy Hash: C6113C71200701BFEB218B65EC49F6B7BB9FFC5B51F248169B412D6250DB71D8019660

                                                          Control-flow Graph

                                                          APIs
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00792B6B
                                                            • Part of subcall function 00793A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00861418,?,00792E7F,?,?,?,00000000), ref: 00793A78
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                          • GetForegroundWindow.USER32(runas,?,?,?,?,?,00852224), ref: 007D2C10
                                                          • ShellExecuteW.SHELL32(00000000,?,?,00852224), ref: 007D2C17
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                          • String ID: runas
                                                          • API String ID: 448630720-4000483414
                                                          • Opcode ID: 166809002b5f5bd619aa244b9b0e33685f561968ff92ed27c58b7515637e77ac
                                                          • Instruction ID: 9577fe96b75e3bb4f651245f3c57196b9cf4e365eafc822a574ccb1d5414e23c
                                                          • Opcode Fuzzy Hash: 166809002b5f5bd619aa244b9b0e33685f561968ff92ed27c58b7515637e77ac
                                                          • Instruction Fuzzy Hash: FC11D271208301EACF14FF64F85AD7EBBA5ABA1341F48542DF556431A3DF2D890A8712

                                                          Control-flow Graph

                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 007FD501
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 007FD50F
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 007FD52F
                                                          • CloseHandle.KERNELBASE(00000000), ref: 007FD5DC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                          • String ID:
                                                          • API String ID: 420147892-0
                                                          • Opcode ID: b5c7125f56644b8de74e19901f072bbf0970f0e3dd880d0e1f39df9921627f91
                                                          • Instruction ID: 0d489c860c6a58efff2ea05f20a90145d5df0d4f63e5a10a395194879a70808c
                                                          • Opcode Fuzzy Hash: b5c7125f56644b8de74e19901f072bbf0970f0e3dd880d0e1f39df9921627f91
                                                          • Instruction Fuzzy Hash: B831A1710083049FD711EF64D885ABFBBE8FF99354F10092DF681832A1EB759949CBA2
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,007D5222), ref: 007FDBCE
                                                          • GetFileAttributesW.KERNELBASE(?), ref: 007FDBDD
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 007FDBEE
                                                          • FindClose.KERNEL32(00000000), ref: 007FDBFA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFind$AttributesCloseFirstlstrlen
                                                          • String ID:
                                                          • API String ID: 2695905019-0
                                                          • Opcode ID: 296031b08773853ac09f0e63b522701cb638e50aa2617ff01bc314b57e813bb3
                                                          • Instruction ID: 792e1cac755db5d6ba580578b15ecdaa7cace16a7210d0a25c971493f3e8700e
                                                          • Opcode Fuzzy Hash: 296031b08773853ac09f0e63b522701cb638e50aa2617ff01bc314b57e813bb3
                                                          • Instruction Fuzzy Hash: 9CF0A0308109189B82306B78AC0E8BE37ADAE01334F108702F976C22E0EBB45D56C6E5
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(007C28E9,?,007B4CBE,007C28E9,008588B8,0000000C,007B4E15,007C28E9,00000002,00000000,?,007C28E9), ref: 007B4D09
                                                          • TerminateProcess.KERNEL32(00000000,?,007B4CBE,007C28E9,008588B8,0000000C,007B4E15,007C28E9,00000002,00000000,?,007C28E9), ref: 007B4D10
                                                          • ExitProcess.KERNEL32 ref: 007B4D22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CurrentExitTerminate
                                                          • String ID:
                                                          • API String ID: 1703294689-0
                                                          • Opcode ID: ddbbdcd63b95460933b6b6a44a87526f81cc0f187cb2093658d1e3e09be0ce39
                                                          • Instruction ID: 2dceb215dccfcaab69cfa35605a1c5dcf440cc4098ecdd23db729d6cd84d813e
                                                          • Opcode Fuzzy Hash: ddbbdcd63b95460933b6b6a44a87526f81cc0f187cb2093658d1e3e09be0ce39
                                                          • Instruction Fuzzy Hash: F7E0B631100548ABCF21AF64DD0EBA83B69FB41795B108418FD059A223CB39DD52DB84

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 81aff9-81b056 call 7b2340 3 81b094-81b098 0->3 4 81b058-81b06b call 79b567 0->4 6 81b09a-81b0bb call 79b567 * 2 3->6 7 81b0dd-81b0e0 3->7 12 81b0c8 4->12 13 81b06d-81b092 call 79b567 * 2 4->13 28 81b0bf-81b0c4 6->28 9 81b0e2-81b0e5 7->9 10 81b0f5-81b119 call 797510 call 797620 7->10 14 81b0e8-81b0ed call 79b567 9->14 31 81b1d8-81b1e0 10->31 32 81b11f-81b178 call 797510 call 797620 call 797510 call 797620 call 797510 call 797620 10->32 17 81b0cb-81b0cf 12->17 13->28 14->10 22 81b0d1-81b0d7 17->22 23 81b0d9-81b0db 17->23 22->14 23->7 23->10 28->7 33 81b0c6 28->33 36 81b1e2-81b1fd call 797510 call 797620 31->36 37 81b20a-81b238 GetCurrentDirectoryW call 7afe0b GetCurrentDirectoryW 31->37 82 81b1a6-81b1d6 GetSystemDirectoryW call 7afe0b GetSystemDirectoryW 32->82 83 81b17a-81b195 call 797510 call 797620 32->83 33->17 36->37 53 81b1ff-81b208 call 7b4963 36->53 45 81b23c 37->45 48 81b240-81b244 45->48 51 81b275-81b285 call 8000d9 48->51 52 81b246-81b270 call 799c6e * 3 48->52 64 81b287-81b289 51->64 65 81b28b-81b2e1 call 8007c0 call 8006e6 call 8005a7 51->65 52->51 53->37 53->51 66 81b2ee-81b2f2 64->66 65->66 98 81b2e3 65->98 71 81b2f8-81b321 call 7f11c8 66->71 72 81b39a-81b3be CreateProcessW 66->72 87 81b323-81b328 call 7f1201 71->87 88 81b32a call 7f14ce 71->88 76 81b3c1-81b3d4 call 7afe14 * 2 72->76 103 81b3d6-81b3e8 76->103 104 81b42f-81b43d CloseHandle 76->104 82->45 83->82 105 81b197-81b1a0 call 7b4963 83->105 97 81b32f-81b33c call 7b4963 87->97 88->97 113 81b347-81b357 call 7b4963 97->113 114 81b33e-81b345 97->114 98->66 109 81b3ea 103->109 110 81b3ed-81b3fc 103->110 107 81b49c 104->107 108 81b43f-81b444 104->108 105->48 105->82 111 81b4a0-81b4a4 107->111 115 81b451-81b456 108->115 116 81b446-81b44c CloseHandle 108->116 109->110 117 81b401-81b42a GetLastError call 79630c call 79cfa0 110->117 118 81b3fe 110->118 119 81b4b2-81b4bc 111->119 120 81b4a6-81b4b0 111->120 136 81b362-81b372 call 7b4963 113->136 137 81b359-81b360 113->137 114->113 114->114 123 81b463-81b468 115->123 124 81b458-81b45e CloseHandle 115->124 116->115 127 81b4e5-81b4f6 call 800175 117->127 118->117 128 81b4c4-81b4e3 call 79cfa0 CloseHandle 119->128 129 81b4be 119->129 120->127 131 81b475-81b49a call 8009d9 call 81b536 123->131 132 81b46a-81b470 CloseHandle 123->132 124->123 128->127 129->128 131->111 132->131 146 81b374-81b37b 136->146 147 81b37d-81b398 call 7afe14 * 3 136->147 137->136 137->137 146->146 146->147 147->76
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 0081B198
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0081B1B0
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0081B1D4
                                                          • _wcslen.LIBCMT ref: 0081B200
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0081B214
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0081B236
                                                          • _wcslen.LIBCMT ref: 0081B332
                                                            • Part of subcall function 008005A7: GetStdHandle.KERNEL32(000000F6), ref: 008005C6
                                                          • _wcslen.LIBCMT ref: 0081B34B
                                                          • _wcslen.LIBCMT ref: 0081B366
                                                          • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0081B3B6
                                                          • GetLastError.KERNEL32(00000000), ref: 0081B407
                                                          • CloseHandle.KERNEL32(?), ref: 0081B439
                                                          • CloseHandle.KERNEL32(00000000), ref: 0081B44A
                                                          • CloseHandle.KERNEL32(00000000), ref: 0081B45C
                                                          • CloseHandle.KERNEL32(00000000), ref: 0081B46E
                                                          • CloseHandle.KERNEL32(?), ref: 0081B4E3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 2178637699-0
                                                          • Opcode ID: 4c807e1dbce932a751ef76c5eae4eb8e9e8d8142d2d1b06b89b7577234d3e896
                                                          • Instruction ID: 203d3f5f10fc92cf8c479dd990ce0a53f1582e222c9d83a057180ef5787548ea
                                                          • Opcode Fuzzy Hash: 4c807e1dbce932a751ef76c5eae4eb8e9e8d8142d2d1b06b89b7577234d3e896
                                                          • Instruction Fuzzy Hash: 40F17931508240DFCB24EF24D885BAABBE5FF85314F14855DF8999B2A2DB35EC84CB52
                                                          APIs
                                                          • GetInputState.USER32 ref: 0079D807
                                                          • timeGetTime.WINMM ref: 0079DA07
                                                          • Sleep.KERNELBASE(0000000A), ref: 0079DBB1
                                                          • Sleep.KERNEL32(0000000A), ref: 007E2B76
                                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 007E2C11
                                                          • WaitForSingleObject.KERNEL32(?,00000000), ref: 007E2C29
                                                          • CloseHandle.KERNEL32(?), ref: 007E2C3D
                                                          • Sleep.KERNEL32(?,CCCCCCCC,00000000), ref: 007E2CA9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Sleep$CloseCodeExitHandleInputObjectProcessSingleStateTimeWaittime
                                                          • String ID:
                                                          • API String ID: 388478766-0
                                                          • Opcode ID: b3897c314bc2bd5eb980920abea4e6131df4b02adabc2a05a1862791217d209e
                                                          • Instruction ID: 5ba9065383869afa9532a8f43e3f433886421c8e58b578957856e4d8a77b243c
                                                          • Opcode Fuzzy Hash: b3897c314bc2bd5eb980920abea4e6131df4b02adabc2a05a1862791217d209e
                                                          • Instruction Fuzzy Hash: F1423370608281DFDB34DF25D848B7AB7E5FF8A310F148619E456872A2D778EC45CB92

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00792D07
                                                          • RegisterClassExW.USER32(00000030), ref: 00792D31
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00792D42
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 00792D5F
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00792D6F
                                                          • LoadIconW.USER32(000000A9), ref: 00792D85
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00792D94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: d7a834d8f64b3c85fc428541e9d4ea17a40d9ce48508736c057a7efdf9eb092b
                                                          • Instruction ID: 80e129b6d6d74aa8acd9c5711094b239631249b26e6baf77557b16a61d606595
                                                          • Opcode Fuzzy Hash: d7a834d8f64b3c85fc428541e9d4ea17a40d9ce48508736c057a7efdf9eb092b
                                                          • Instruction Fuzzy Hash: 2121E0B1901218AFDF10DFA8E889BEDBFB4FB08701F04811AF611A62A0D7B54544CF91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 468 7d065b-7d068b call 7d042f 471 7d068d-7d0698 call 7bf2c6 468->471 472 7d06a6-7d06b2 call 7c5221 468->472 477 7d069a-7d06a1 call 7bf2d9 471->477 478 7d06cb-7d0714 call 7d039a 472->478 479 7d06b4-7d06c9 call 7bf2c6 call 7bf2d9 472->479 488 7d097d-7d0983 477->488 486 7d0716-7d071f 478->486 487 7d0781-7d078a GetFileType 478->487 479->477 491 7d0756-7d077c GetLastError call 7bf2a3 486->491 492 7d0721-7d0725 486->492 493 7d078c-7d07bd GetLastError call 7bf2a3 CloseHandle 487->493 494 7d07d3-7d07d6 487->494 491->477 492->491 497 7d0727-7d0754 call 7d039a 492->497 493->477 505 7d07c3-7d07ce call 7bf2d9 493->505 495 7d07df-7d07e5 494->495 496 7d07d8-7d07dd 494->496 500 7d07e9-7d0837 call 7c516a 495->500 501 7d07e7 495->501 496->500 497->487 497->491 511 7d0839-7d0845 call 7d05ab 500->511 512 7d0847-7d086b call 7d014d 500->512 501->500 505->477 511->512 519 7d086f-7d0879 call 7c86ae 511->519 517 7d086d 512->517 518 7d087e-7d08c1 512->518 517->519 521 7d08c3-7d08c7 518->521 522 7d08e2-7d08f0 518->522 519->488 521->522 524 7d08c9-7d08dd 521->524 525 7d097b 522->525 526 7d08f6-7d08fa 522->526 524->522 525->488 526->525 527 7d08fc-7d092f CloseHandle call 7d039a 526->527 530 7d0931-7d095d GetLastError call 7bf2a3 call 7c5333 527->530 531 7d0963-7d0977 527->531 530->531 531->525
                                                          APIs
                                                            • Part of subcall function 007D039A: CreateFileW.KERNELBASE(00000000,00000000,?,007D0704,?,?,00000000,?,007D0704,00000000,0000000C), ref: 007D03B7
                                                          • GetLastError.KERNEL32 ref: 007D076F
                                                          • __dosmaperr.LIBCMT ref: 007D0776
                                                          • GetFileType.KERNELBASE(00000000), ref: 007D0782
                                                          • GetLastError.KERNEL32 ref: 007D078C
                                                          • __dosmaperr.LIBCMT ref: 007D0795
                                                          • CloseHandle.KERNEL32(00000000), ref: 007D07B5
                                                          • CloseHandle.KERNEL32(?), ref: 007D08FF
                                                          • GetLastError.KERNEL32 ref: 007D0931
                                                          • __dosmaperr.LIBCMT ref: 007D0938
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                          • String ID: H
                                                          • API String ID: 4237864984-2852464175
                                                          • Opcode ID: 65d95e3a64dd887d27aeda33d1edca6085ba6861d52afa7e25bd68a292311cad
                                                          • Instruction ID: e41a6e7cdb754b49df84f6c576ad8e7cce330381d4aac5ee217ae32bc909bc39
                                                          • Opcode Fuzzy Hash: 65d95e3a64dd887d27aeda33d1edca6085ba6861d52afa7e25bd68a292311cad
                                                          • Instruction Fuzzy Hash: 51A10232A001089FDF19EF68DC55BAE7BB0AB46320F14515EF8159F3D1DB799812CB91

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00793A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00861418,?,00792E7F,?,?,?,00000000), ref: 00793A78
                                                            • Part of subcall function 00793357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00793379
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0079356A
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 007D318D
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 007D31CE
                                                          • RegCloseKey.ADVAPI32(?), ref: 007D3210
                                                          • _wcslen.LIBCMT ref: 007D3277
                                                          • _wcslen.LIBCMT ref: 007D3286
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                          • API String ID: 98802146-2727554177
                                                          • Opcode ID: 2cb964f3ef7e3acaf7bbfae9498224450c45724328ac8d800894703ad50cd7f6
                                                          • Instruction ID: d5fa5aa0d6b791d432f35919a0b0239c36dec11d36a9d2d3caac563c402812ee
                                                          • Opcode Fuzzy Hash: 2cb964f3ef7e3acaf7bbfae9498224450c45724328ac8d800894703ad50cd7f6
                                                          • Instruction Fuzzy Hash: 6971AB714047019EC714EF69ED859ABBBE8FF85340F41182EF185833B0EB789A48CB62

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00792B8E
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00792B9D
                                                          • LoadIconW.USER32(00000063), ref: 00792BB3
                                                          • LoadIconW.USER32(000000A4), ref: 00792BC5
                                                          • LoadIconW.USER32(000000A2), ref: 00792BD7
                                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00792BEF
                                                          • RegisterClassExW.USER32(?), ref: 00792C40
                                                            • Part of subcall function 00792CD4: GetSysColorBrush.USER32(0000000F), ref: 00792D07
                                                            • Part of subcall function 00792CD4: RegisterClassExW.USER32(00000030), ref: 00792D31
                                                            • Part of subcall function 00792CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00792D42
                                                            • Part of subcall function 00792CD4: InitCommonControlsEx.COMCTL32(?), ref: 00792D5F
                                                            • Part of subcall function 00792CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00792D6F
                                                            • Part of subcall function 00792CD4: LoadIconW.USER32(000000A9), ref: 00792D85
                                                            • Part of subcall function 00792CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00792D94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                          • String ID: #$0$AutoIt v3
                                                          • API String ID: 423443420-4155596026
                                                          • Opcode ID: 8b5a332919a86c8be80270d368716aeca54c43b3f662a562aba5404b9c292e24
                                                          • Instruction ID: d398288a8b67f5b24e8047e9290b19c75eedd2a1bc62831b76022c300fefb2a6
                                                          • Opcode Fuzzy Hash: 8b5a332919a86c8be80270d368716aeca54c43b3f662a562aba5404b9c292e24
                                                          • Instruction Fuzzy Hash: F4213970E10318AFDF119FA9EE49AAD7FB4FB08B50F09502AE501A67A1D7F90540DF90

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 609 793170-793185 610 7931e5-7931e7 609->610 611 793187-79318a 609->611 610->611 614 7931e9 610->614 612 7931eb 611->612 613 79318c-793193 611->613 616 7d2dfb-7d2e23 call 7918e2 call 7ae499 612->616 617 7931f1-7931f6 612->617 618 793199-79319e 613->618 619 793265-79326d PostQuitMessage 613->619 615 7931d0-7931d8 DefWindowProcW 614->615 625 7931de-7931e4 615->625 655 7d2e28-7d2e2f 616->655 620 7931f8-7931fb 617->620 621 79321d-793244 SetTimer RegisterWindowMessageW 617->621 623 7d2e7c-7d2e90 call 7fbf30 618->623 624 7931a4-7931a8 618->624 626 793219-79321b 619->626 627 7d2d9c-7d2d9f 620->627 628 793201-79320f KillTimer call 7930f2 620->628 621->626 630 793246-793251 CreatePopupMenu 621->630 623->626 650 7d2e96 623->650 631 7d2e68-7d2e72 call 7fc161 624->631 632 7931ae-7931b3 624->632 626->625 640 7d2dd7-7d2df6 MoveWindow 627->640 641 7d2da1-7d2da5 627->641 645 793214 call 793c50 628->645 630->626 646 7d2e77 631->646 637 7d2e4d-7d2e54 632->637 638 7931b9-7931be 632->638 637->615 644 7d2e5a-7d2e63 call 7f0ad7 637->644 648 793253-793263 call 79326f 638->648 649 7931c4-7931ca 638->649 640->626 642 7d2da7-7d2daa 641->642 643 7d2dc6-7d2dd2 SetFocus 641->643 642->649 651 7d2db0-7d2dc1 call 7918e2 642->651 643->626 644->615 645->626 646->626 648->626 649->615 649->655 650->615 651->626 655->615 659 7d2e35-7d2e48 call 7930f2 call 793837 655->659 659->615
                                                          APIs
                                                          • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0079316A,?,?), ref: 007931D8
                                                          • KillTimer.USER32(?,00000001,?,?,?,?,?,0079316A,?,?), ref: 00793204
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00793227
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0079316A,?,?), ref: 00793232
                                                          • CreatePopupMenu.USER32 ref: 00793246
                                                          • PostQuitMessage.USER32(00000000), ref: 00793267
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                          • String ID: TaskbarCreated
                                                          • API String ID: 129472671-2362178303
                                                          • Opcode ID: df5087c3081f686b307d9fc9972cef6407dd4c635807f8703e709e64a73f05d2
                                                          • Instruction ID: b88ead795fda486ace0de007072902b9d5d3a1b483f53d4068bbec3cff35ffe2
                                                          • Opcode Fuzzy Hash: df5087c3081f686b307d9fc9972cef6407dd4c635807f8703e709e64a73f05d2
                                                          • Instruction Fuzzy Hash: CC41EA31244608ABDF245BB8BD4DB7D3A5AF705340F094126F512C63B3C7AD9A42D7A1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 665 791410-791449 666 7d24b8-7d24b9 DestroyWindow 665->666 667 79144f-791465 mciSendStringW 665->667 671 7d24c4-7d24d1 666->671 668 79146b-791473 667->668 669 7916c6-7916d3 667->669 670 791479-791488 call 79182e 668->670 668->671 672 7916f8-7916ff 669->672 673 7916d5-7916f0 UnregisterHotKey 669->673 685 7d250e-7d251a 670->685 686 79148e-791496 670->686 677 7d2500-7d2507 671->677 678 7d24d3-7d24d6 671->678 672->668 676 791705 672->676 673->672 675 7916f2-7916f3 call 7910d0 673->675 675->672 676->669 677->671 681 7d2509 677->681 682 7d24d8-7d24e0 call 796246 678->682 683 7d24e2-7d24e5 FindClose 678->683 681->685 687 7d24eb-7d24f8 682->687 683->687 692 7d251c-7d251e FreeLibrary 685->692 693 7d2524-7d252b 685->693 689 79149c-7914c1 call 79cfa0 686->689 690 7d2532-7d253f 686->690 687->677 691 7d24fa-7d24fb call 8032b1 687->691 703 7914f8-791503 CoUninitialize 689->703 704 7914c3 689->704 697 7d2566-7d256d 690->697 698 7d2541-7d255e VirtualFree 690->698 691->677 692->693 693->685 696 7d252d 693->696 696->690 697->690 700 7d256f 697->700 698->697 699 7d2560-7d2561 call 803317 698->699 699->697 705 7d2574-7d2578 700->705 703->705 707 791509-79150e 703->707 706 7914c6-7914f6 call 791a05 call 7919ae 704->706 705->707 708 7d257e-7d2584 705->708 706->703 710 7d2589-7d2596 call 8032eb 707->710 711 791514-79151e 707->711 708->707 724 7d2598 710->724 712 791524-7915a5 call 79988f call 791944 call 7917d5 call 7afe14 call 79177c call 79988f call 79cfa0 call 7917fe call 7afe14 711->712 713 791707-791714 call 7af80e 711->713 728 7d259d-7d25bf call 7afdcd 712->728 754 7915ab-7915cf call 7afe14 712->754 713->712 726 79171a 713->726 724->728 726->713 733 7d25c1 728->733 736 7d25c6-7d25e8 call 7afdcd 733->736 742 7d25ea 736->742 745 7d25ef-7d2611 call 7afdcd 742->745 752 7d2613 745->752 755 7d2618-7d2625 call 7f64d4 752->755 754->736 761 7915d5-7915f9 call 7afe14 754->761 760 7d2627 755->760 763 7d262c-7d2639 call 7aac64 760->763 761->745 766 7915ff-791619 call 7afe14 761->766 769 7d263b 763->769 766->755 771 79161f-791643 call 7917d5 call 7afe14 766->771 772 7d2640-7d264d call 803245 769->772 771->763 780 791649-791651 771->780 779 7d264f 772->779 782 7d2654-7d2661 call 8032cc 779->782 780->772 781 791657-791675 call 79988f call 79190a 780->781 781->782 791 79167b-791689 781->791 788 7d2663 782->788 790 7d2668-7d2675 call 8032cc 788->790 796 7d2677 790->796 791->790 793 79168f-7916c5 call 79988f * 3 call 791876 791->793 796->796
                                                          APIs
                                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00791459
                                                          • CoUninitialize.COMBASE ref: 007914F8
                                                          • UnregisterHotKey.USER32(?), ref: 007916DD
                                                          • DestroyWindow.USER32(?), ref: 007D24B9
                                                          • FreeLibrary.KERNEL32(?), ref: 007D251E
                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 007D254B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                          • String ID: close all
                                                          • API String ID: 469580280-3243417748
                                                          • Opcode ID: d7f2caede86ea2f3fe1ff051645b07194a4106331aa0673e4822095c3a68a477
                                                          • Instruction ID: c7861e0bdc8097eba4ee072285c9850986ecb3fcb0f69fcd631089ab8104a70d
                                                          • Opcode Fuzzy Hash: d7f2caede86ea2f3fe1ff051645b07194a4106331aa0673e4822095c3a68a477
                                                          • Instruction Fuzzy Hash: 28D17C31701212CFDB29DF54E899A29F7A0BF15700F5542AEE54AAB352DB38AC23CF51

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 814 792c63-792cd3 CreateWindowExW * 2 ShowWindow * 2
                                                          APIs
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00792C91
                                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00792CB2
                                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00791CAD,?), ref: 00792CC6
                                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00791CAD,?), ref: 00792CCF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateShow
                                                          • String ID: AutoIt v3$edit
                                                          • API String ID: 1584632944-3779509399
                                                          • Opcode ID: 00493fde55ffb1af6400b394ba6a67bef2637cb5254a8929ed13d0807753ef19
                                                          • Instruction ID: 85e585367615bd840bfe22b5ca990b4eff3bd5d3110f68de9ec868e68df2204f
                                                          • Opcode Fuzzy Hash: 00493fde55ffb1af6400b394ba6a67bef2637cb5254a8929ed13d0807753ef19
                                                          • Instruction Fuzzy Hash: ECF03A755402907AEB310717AC0CE7B2EBDF7CAF50B06501AF901A63A1C2A90881EAB0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 929 7fe97b-7fe986 930 7fe9f9-7fe9fb 929->930 931 7fe988 929->931 932 7fe98e-7fe991 931->932 933 7fe98a-7fe98c 931->933 934 7fe993-7fe99f QueryPerformanceCounter 932->934 935 7fe9f2 932->935 936 7fe9f3 Sleep 933->936 934->935 937 7fe9a1-7fe9a5 QueryPerformanceFrequency 934->937 935->936 936->930 938 7fe9ab-7fe9ee Sleep QueryPerformanceCounter call 7d20b0 937->938 941 7fe9f0 938->941 941->930
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 007FE997
                                                          • QueryPerformanceFrequency.KERNEL32(?), ref: 007FE9A5
                                                          • Sleep.KERNEL32(00000000), ref: 007FE9AD
                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 007FE9B7
                                                          • Sleep.KERNELBASE ref: 007FE9F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                                          • String ID:
                                                          • API String ID: 2833360925-0
                                                          • Opcode ID: 785eb37603eee3df54ab57515492fdec13da4091bb317600c0d665eb27d367f8
                                                          • Instruction ID: d84977f14dec37f889ecf8f2f1f1a60b4e23ae4dbb112653ab5355aab647627f
                                                          • Opcode Fuzzy Hash: 785eb37603eee3df54ab57515492fdec13da4091bb317600c0d665eb27d367f8
                                                          • Instruction Fuzzy Hash: E3013931C01A2DDBCF10DBE4D8496EDBB78BB09700F004546E612B2261DB78A556C7A2

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 978 793b1c-793b27 979 793b99-793b9b 978->979 980 793b29-793b2e 978->980 981 793b8c-793b8f 979->981 980->979 982 793b30-793b48 RegOpenKeyExW 980->982 982->979 983 793b4a-793b69 RegQueryValueExW 982->983 984 793b6b-793b76 983->984 985 793b80-793b8b RegCloseKey 983->985 986 793b78-793b7a 984->986 987 793b90-793b97 984->987 985->981 988 793b7e 986->988 987->988 988->985
                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00793B0F,SwapMouseButtons,00000004,?), ref: 00793B40
                                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00793B0F,SwapMouseButtons,00000004,?), ref: 00793B61
                                                          • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00793B0F,SwapMouseButtons,00000004,?), ref: 00793B83
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID: Control Panel\Mouse
                                                          • API String ID: 3677997916-824357125
                                                          • Opcode ID: 249429c760726edc3870b2f86ba118e131a9672e9b2d1e0bf4046d90c28a6e4d
                                                          • Instruction ID: d5c9a689b2db10edfac13b2b75b3d4d61fdd74f3280ff45a762a947ee92bd976
                                                          • Opcode Fuzzy Hash: 249429c760726edc3870b2f86ba118e131a9672e9b2d1e0bf4046d90c28a6e4d
                                                          • Instruction Fuzzy Hash: 8E1127B5610208FFDF208FA5EC84EAEBBB8EF04744B10846AA805D7210E2759E419BA0
                                                          APIs
                                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 007D33A2
                                                            • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00793A04
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: IconLoadNotifyShell_String_wcslen
                                                          • String ID: Line:
                                                          • API String ID: 2289894680-1585850449
                                                          • Opcode ID: 144237a5fdc609f7cccada962d3bf688dfd29444f4b4c51b1bc335682e86a814
                                                          • Instruction ID: 2fdb00029ab7ed4d7db430bf05aacc577d295dbbb240c7a3af1a915a491b316a
                                                          • Opcode Fuzzy Hash: 144237a5fdc609f7cccada962d3bf688dfd29444f4b4c51b1bc335682e86a814
                                                          • Instruction Fuzzy Hash: 7F31B871408300AADB25EB10EC49FEFB7E8BB44714F14451EF59993292DB7CA649C7C2
                                                          APIs
                                                            • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00791BF4
                                                            • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00791BFC
                                                            • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00791C07
                                                            • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00791C12
                                                            • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00791C1A
                                                            • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00791C22
                                                            • Part of subcall function 00791B4A: RegisterWindowMessageW.USER32(00000004,?,007912C4), ref: 00791BA2
                                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0079136A
                                                          • OleInitialize.OLE32 ref: 00791388
                                                          • CloseHandle.KERNEL32(00000000,00000000), ref: 007D24AB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                          • String ID:
                                                          • API String ID: 1986988660-0
                                                          • Opcode ID: 26b710dcb7c6dbcc100c2c69d4f86dbe573aa0300342dd89a3340e7b97fd4c13
                                                          • Instruction ID: 738ae330082690405791bbdc6ff39a4a900652620ebc1d55467ed0fde97f0abe
                                                          • Opcode Fuzzy Hash: 26b710dcb7c6dbcc100c2c69d4f86dbe573aa0300342dd89a3340e7b97fd4c13
                                                          • Instruction Fuzzy Hash: 9B71BFB49112018ECF84DFBAB94D659BAE1FB8834475EA23AD10BC7363EBB44445CF85
                                                          APIs
                                                            • Part of subcall function 00793923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00793A04
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 007FC259
                                                          • KillTimer.USER32(?,00000001,?,?), ref: 007FC261
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 007FC270
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_Timer$Kill
                                                          • String ID:
                                                          • API String ID: 3500052701-0
                                                          • Opcode ID: fc89c4ad70b6a98d259dfb4ce3f2a30ed1be3f8ac97029db5285c854c85fae5e
                                                          • Instruction ID: d035f678e4b71a02f4b62a5f63034036940ec6b55a205a9173914a0ce1d2a3eb
                                                          • Opcode Fuzzy Hash: fc89c4ad70b6a98d259dfb4ce3f2a30ed1be3f8ac97029db5285c854c85fae5e
                                                          • Instruction Fuzzy Hash: AA31647090434CAFEB339B648955BFBBBECAF06304F04449AD79A97341C7785A85CB51
                                                          APIs
                                                          • CloseHandle.KERNELBASE(00000000,00000000,?,?,007C85CC,?,00858CC8,0000000C), ref: 007C8704
                                                          • GetLastError.KERNEL32(?,007C85CC,?,00858CC8,0000000C), ref: 007C870E
                                                          • __dosmaperr.LIBCMT ref: 007C8739
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseErrorHandleLast__dosmaperr
                                                          • String ID:
                                                          • API String ID: 2583163307-0
                                                          • Opcode ID: 348e4b55f818ce13211189e69421eb253f990cfd02c929ba47121f57de5b561d
                                                          • Instruction ID: 038aedd8378d93648f40ed4e035e14a38a920da34e65a84ba1646d2e9795eb76
                                                          • Opcode Fuzzy Hash: 348e4b55f818ce13211189e69421eb253f990cfd02c929ba47121f57de5b561d
                                                          • Instruction Fuzzy Hash: 75018E3260526066C3B06334684DF7F67494B8177CF39021DF804AB1D3DEADECC18192
                                                          APIs
                                                          • TranslateMessage.USER32(?), ref: 0079DB7B
                                                          • DispatchMessageW.USER32(?), ref: 0079DB89
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0079DB9F
                                                          • Sleep.KERNELBASE(0000000A), ref: 0079DBB1
                                                          • TranslateAcceleratorW.USER32(?,?,?), ref: 007E1CC9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                          • String ID:
                                                          • API String ID: 3288985973-0
                                                          • Opcode ID: 94ee07bf90e4766d926a0e5dd3892789b8e91932b996e4683b307bbc4704acda
                                                          • Instruction ID: 463e02b8307d0bc9fba0aed3d030c9946e1304ed8edb04472ce21d1071fe0772
                                                          • Opcode Fuzzy Hash: 94ee07bf90e4766d926a0e5dd3892789b8e91932b996e4683b307bbc4704acda
                                                          • Instruction Fuzzy Hash: 61F054306043409BEB30C7A19C49FAA73A8FB45310F504A29E61AC30D0DB3894499B25
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 007A17F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID: CALL
                                                          • API String ID: 1385522511-4196123274
                                                          • Opcode ID: a3c9dae9eb495f215060a1d7c39e7cfcfdd7be0f6cf0e09ab0aaaa17c7fc5a34
                                                          • Instruction ID: 386abfe4fa2cc6255c56fa3ff80ec4ef6cd7231a6847f22c8e390bce480d29e5
                                                          • Opcode Fuzzy Hash: a3c9dae9eb495f215060a1d7c39e7cfcfdd7be0f6cf0e09ab0aaaa17c7fc5a34
                                                          • Instruction Fuzzy Hash: E2229B70608241DFE714CF14C894A2ABBF1BFDA354F548A6DF4968B3A1D739E851CB82
                                                          APIs
                                                          • GetOpenFileNameW.COMDLG32(?), ref: 007D2C8C
                                                            • Part of subcall function 00793AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00793A97,?,?,00792E7F,?,?,?,00000000), ref: 00793AC2
                                                            • Part of subcall function 00792DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00792DC4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Name$Path$FileFullLongOpen
                                                          • String ID: X
                                                          • API String ID: 779396738-3081909835
                                                          • Opcode ID: b0892f50dab0fdb90e979a0c08abf6ee6e34749eb112054469749e03c6d2799d
                                                          • Instruction ID: 6695ef9d248abe62d98f549ebebb0cddeb006256bb336571e705132d4875a4cb
                                                          • Opcode Fuzzy Hash: b0892f50dab0fdb90e979a0c08abf6ee6e34749eb112054469749e03c6d2799d
                                                          • Instruction Fuzzy Hash: FA219971A102589FDF41EF94D849BDE7BF8AF48305F404059E505E7341EBB8594E8F61
                                                          APIs
                                                            • Part of subcall function 007C2D74: GetLastError.KERNEL32(?,?,007C5686,007D3CD6,?,00000000,?,007C5B6A,?,?,?,?,?,007BE6D1,?,00858A48), ref: 007C2D78
                                                            • Part of subcall function 007C2D74: _free.LIBCMT ref: 007C2DAB
                                                            • Part of subcall function 007C2D74: SetLastError.KERNEL32(00000000,?,?,?,?,007BE6D1,?,00858A48,00000010,00794F4A,?,?,00000000,007D3CD6), ref: 007C2DEC
                                                            • Part of subcall function 007C2D74: _abort.LIBCMT ref: 007C2DF2
                                                            • Part of subcall function 007CCADA: _abort.LIBCMT ref: 007CCB0C
                                                            • Part of subcall function 007CCADA: _free.LIBCMT ref: 007CCB40
                                                            • Part of subcall function 007CC74F: GetOEMCP.KERNEL32(00000000), ref: 007CC77A
                                                          • _free.LIBCMT ref: 007CCA33
                                                          • _free.LIBCMT ref: 007CCA69
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorLast_abort
                                                          • String ID:
                                                          • API String ID: 2991157371-0
                                                          • Opcode ID: 86710a2690816e2a4b0ae75d2d7ae144aea8648cb3c790cefbd816ca8e9ef114
                                                          • Instruction ID: 5abe6b8a09efb6a030bde2a604ef2fad8d731cf95d77d66f45f193f6bfd3d2a5
                                                          • Opcode Fuzzy Hash: 86710a2690816e2a4b0ae75d2d7ae144aea8648cb3c790cefbd816ca8e9ef114
                                                          • Instruction Fuzzy Hash: BE31B331904208EFDB12EBA8D449F9D77F4EF40320F25419DE8089B2A2EB399E41CF50
                                                          APIs
                                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00793908
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_
                                                          • String ID:
                                                          • API String ID: 1144537725-0
                                                          • Opcode ID: c8d43d58b3346000870bc61e56436d4c6fa0346ddd3438c1d8fad8fe72094e3b
                                                          • Instruction ID: 2f3ebd533947ee924f3b2a3686ff50593c3ea215e7337e3bdf96b13b0f1c93eb
                                                          • Opcode Fuzzy Hash: c8d43d58b3346000870bc61e56436d4c6fa0346ddd3438c1d8fad8fe72094e3b
                                                          • Instruction Fuzzy Hash: 71318070504301DFDB20DF24E989B97BBE4FB49718F04092EF59A87341E7B9AA44CB92
                                                          APIs
                                                          • timeGetTime.WINMM ref: 007AF661
                                                            • Part of subcall function 0079D730: GetInputState.USER32 ref: 0079D807
                                                          • Sleep.KERNEL32(00000000), ref: 007EF2DE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: InputSleepStateTimetime
                                                          • String ID:
                                                          • API String ID: 4149333218-0
                                                          • Opcode ID: 8ea403bf5d826e3d4984445c7abc6038e519143809f64441836822ce692db8cd
                                                          • Instruction ID: cd2390483bfc6c69f66d201f278ec05f6148bfbbbadd40b6120ebfad1b596b1a
                                                          • Opcode Fuzzy Hash: 8ea403bf5d826e3d4984445c7abc6038e519143809f64441836822ce692db8cd
                                                          • Instruction Fuzzy Hash: 04F08C31240A05EFD320EFA9E549B6AB7E8FF49760F00402AE859C7260DB70A810CB91
                                                          APIs
                                                            • Part of subcall function 00794E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00794EDD,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E9C
                                                            • Part of subcall function 00794E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00794EAE
                                                            • Part of subcall function 00794E90: FreeLibrary.KERNEL32(00000000,?,?,00794EDD,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794EC0
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794EFD
                                                            • Part of subcall function 00794E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,007D3CDE,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E62
                                                            • Part of subcall function 00794E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00794E74
                                                            • Part of subcall function 00794E59: FreeLibrary.KERNEL32(00000000,?,?,007D3CDE,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E87
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$Load$AddressFreeProc
                                                          • String ID:
                                                          • API String ID: 2632591731-0
                                                          • Opcode ID: 6b0ad246482d5bcc4af6abb3e9e1b2656c99c02d8eff87cb9adcf234ab7ebb1d
                                                          • Instruction ID: 4608e6460e2bfca4f21fd3460a3852ce9c5619733259aed49a218a51784e7ec1
                                                          • Opcode Fuzzy Hash: 6b0ad246482d5bcc4af6abb3e9e1b2656c99c02d8eff87cb9adcf234ab7ebb1d
                                                          • Instruction Fuzzy Hash: 72110632610216EACF24FF74EC0AFAD77A6AF40750F10842EF542B62D1EE789E469750
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: __wsopen_s
                                                          • String ID:
                                                          • API String ID: 3347428461-0
                                                          • Opcode ID: 0e3e01f478f0258b616d666f9a9170da5369c23d459bd0903d20ef8a05105f49
                                                          • Instruction ID: 7bb2b5691baea7f0c2c3c6a4ae491c475b1ed32b7a06d529656d13672050ff95
                                                          • Opcode Fuzzy Hash: 0e3e01f478f0258b616d666f9a9170da5369c23d459bd0903d20ef8a05105f49
                                                          • Instruction Fuzzy Hash: FC11187590410AAFCB09DF58E945E9A7BF5EF48314F154069FC08AB312DA31EA11CBA5
                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,?,?,?,008214B5,?), ref: 00822A01
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ForegroundWindow
                                                          • String ID:
                                                          • API String ID: 2020703349-0
                                                          • Opcode ID: e5dbb64196d06f0c9943d16cebc55f771979c3205c9df4c47a36c218affa63c7
                                                          • Instruction ID: dbef55197ab4fffc0213eb6124773c8d8c3e006491a7ebeeb39c5a3ce5b6b181
                                                          • Opcode Fuzzy Hash: e5dbb64196d06f0c9943d16cebc55f771979c3205c9df4c47a36c218affa63c7
                                                          • Instruction Fuzzy Hash: 15018036700671AFD3248A2CE454F263792FB85318F698569D047CB651D632ECC2C790
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                          • Instruction ID: 7bb0f0430eb54cbbb47a9fce119b1fbec87699e6dee5000cb9f6e4fa74dbe20c
                                                          • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                          • Instruction Fuzzy Hash: C1F0C832511A14EAD7313A699C0DFDA37989F52339F10072DF925D33D2DB7CE80286A6
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000000,?,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6,?,00791129), ref: 007C3852
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: 8bfe129dfaa8ca46d198a6b2e6fc050d4d607ed43eb5b0f1de04e6591ac01abc
                                                          • Instruction ID: 07332740cedc7133cc962f4ceeded3eb6984d74b6c6f6981516ee786fe0059a7
                                                          • Opcode Fuzzy Hash: 8bfe129dfaa8ca46d198a6b2e6fc050d4d607ed43eb5b0f1de04e6591ac01abc
                                                          • Instruction Fuzzy Hash: 03E0E532104624AAF6312A669C09FEA37D8AB42BB0F09802EFC0592581CB1CDD0185F0
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794F6D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: 4cf7c5689717d4d054889eadd488f04ae3ac5b7b44b46e583645f250e3ce79b2
                                                          • Instruction ID: 0e67bf06989733bd46296256f6149fd0240226587a8bc39da44dcc509a31d4be
                                                          • Opcode Fuzzy Hash: 4cf7c5689717d4d054889eadd488f04ae3ac5b7b44b46e583645f250e3ce79b2
                                                          • Instruction Fuzzy Hash: F0F03971105752CFDF349F64E494C66BBE6FF143293288A7EE1EA82621C7399845DF10
                                                          APIs
                                                          • IsWindow.USER32(00000000), ref: 00822A66
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window
                                                          • String ID:
                                                          • API String ID: 2353593579-0
                                                          • Opcode ID: 06cdd353116719869711d6074f2e39f816ab725b585c1ca0868e792627d5230b
                                                          • Instruction ID: 1b491fedc7daedeeaff3d35177b6284add27374ec9cbab8ac7a64cb1c42ad27e
                                                          • Opcode Fuzzy Hash: 06cdd353116719869711d6074f2e39f816ab725b585c1ca0868e792627d5230b
                                                          • Instruction Fuzzy Hash: E1E04F3635013EBAC754EA30EC848FE735CFB54399710463AAD1BD2650DB34999586A0
                                                          APIs
                                                          • Shell_NotifyIconW.SHELL32(00000002,?), ref: 0079314E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_
                                                          • String ID:
                                                          • API String ID: 1144537725-0
                                                          • Opcode ID: 5cac19a2d90a0d7d5cc49f7d1b29aae9b93343ef7e94b52d41423b01951069ed
                                                          • Instruction ID: 654498989bdc73b2077ec103a7ef98db9f1c363d2a2dec2b83f7ab59727ed30d
                                                          • Opcode Fuzzy Hash: 5cac19a2d90a0d7d5cc49f7d1b29aae9b93343ef7e94b52d41423b01951069ed
                                                          • Instruction Fuzzy Hash: 9FF0A7709043089FEB529B24DC49BDA7BFCB701708F0400E5E14997392D7B85788CF81
                                                          APIs
                                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00792DC4
                                                            • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: LongNamePath_wcslen
                                                          • String ID:
                                                          • API String ID: 541455249-0
                                                          • Opcode ID: 997c9b6fc8f19d5a5c771d19df4cb0670038ed7d52bb793577be507ebf3cf128
                                                          • Instruction ID: a2e3175cc91fe7520817b2dfa6f963f0b0fba8e271ecbdcf22382962eb9483d2
                                                          • Opcode Fuzzy Hash: 997c9b6fc8f19d5a5c771d19df4cb0670038ed7d52bb793577be507ebf3cf128
                                                          • Instruction Fuzzy Hash: 85E0CD726001249BCB209398DC09FEA77EDDFC8790F044171FD09D724CDA64AD848550
                                                          APIs
                                                            • Part of subcall function 00793837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00793908
                                                            • Part of subcall function 0079D730: GetInputState.USER32 ref: 0079D807
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00792B6B
                                                            • Part of subcall function 007930F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0079314E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                          • String ID:
                                                          • API String ID: 3667716007-0
                                                          • Opcode ID: 4d7e7fab0a873c5b38a5752417760c00142bf77593179257a43a6b83af0d061b
                                                          • Instruction ID: c9c7c91cda7b62c87ad5b59d47a01f173c7cb81440686caa6b04665ce1df4674
                                                          • Opcode Fuzzy Hash: 4d7e7fab0a873c5b38a5752417760c00142bf77593179257a43a6b83af0d061b
                                                          • Instruction Fuzzy Hash: C3E0262130020486CE08BBB5B85E87DA38AABD1351F40143EF242831A3DE2C494A4252
                                                          APIs
                                                          • CreateFileW.KERNELBASE(00000000,00000000,?,007D0704,?,?,00000000,?,007D0704,00000000,0000000C), ref: 007D03B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: 004e4a2504058e6188035501fcd7b60f631c654d2630587c800ad25ee0b3f8f0
                                                          • Instruction ID: 50dd765e8125d2160cd10d6c859b739a08b8a276e089b88899d424796b31df96
                                                          • Opcode Fuzzy Hash: 004e4a2504058e6188035501fcd7b60f631c654d2630587c800ad25ee0b3f8f0
                                                          • Instruction Fuzzy Hash: 4FD06C3204010DBBDF128F84DD06EDA3BAAFB48714F018000BE1856020C732E832AB90
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00791CBC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: InfoParametersSystem
                                                          • String ID:
                                                          • API String ID: 3098949447-0
                                                          • Opcode ID: f981dc6f2a027177d5094b34aa241f08e2033c2447979bae6667f8eb4135b8e4
                                                          • Instruction ID: 666b9bc7056fadd4f3b1fa689200c29b2859419a5c5e8daec44f423b0fe6eb51
                                                          • Opcode Fuzzy Hash: f981dc6f2a027177d5094b34aa241f08e2033c2447979bae6667f8eb4135b8e4
                                                          • Instruction Fuzzy Hash: 2DC09236280304AFF6258B80BE4EF247764B758B00F099001F60AA96E3C3E26820EA90
                                                          APIs
                                                            • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0082961A
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0082965B
                                                          • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0082969F
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008296C9
                                                          • SendMessageW.USER32 ref: 008296F2
                                                          • GetKeyState.USER32(00000011), ref: 0082978B
                                                          • GetKeyState.USER32(00000009), ref: 00829798
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 008297AE
                                                          • GetKeyState.USER32(00000010), ref: 008297B8
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008297E9
                                                          • SendMessageW.USER32 ref: 00829810
                                                          • SendMessageW.USER32(?,00001030,?,00827E95), ref: 00829918
                                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0082992E
                                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00829941
                                                          • SetCapture.USER32(?), ref: 0082994A
                                                          • ClientToScreen.USER32(?,?), ref: 008299AF
                                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 008299BC
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008299D6
                                                          • ReleaseCapture.USER32 ref: 008299E1
                                                          • GetCursorPos.USER32(?), ref: 00829A19
                                                          • ScreenToClient.USER32(?,?), ref: 00829A26
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00829A80
                                                          • SendMessageW.USER32 ref: 00829AAE
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00829AEB
                                                          • SendMessageW.USER32 ref: 00829B1A
                                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00829B3B
                                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00829B4A
                                                          • GetCursorPos.USER32(?), ref: 00829B68
                                                          • ScreenToClient.USER32(?,?), ref: 00829B75
                                                          • GetParent.USER32(?), ref: 00829B93
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00829BFA
                                                          • SendMessageW.USER32 ref: 00829C2B
                                                          • ClientToScreen.USER32(?,?), ref: 00829C84
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00829CB4
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00829CDE
                                                          • SendMessageW.USER32 ref: 00829D01
                                                          • ClientToScreen.USER32(?,?), ref: 00829D4E
                                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00829D82
                                                            • Part of subcall function 007A9944: GetWindowLongW.USER32(?,000000EB), ref: 007A9952
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00829E05
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                          • String ID: @GUI_DRAGID$F
                                                          • API String ID: 3429851547-4164748364
                                                          • Opcode ID: 8e1c27fa4a237ca7aef404305f49132a18adfe0583d54bc3fbc9a5ccdadbba82
                                                          • Instruction ID: 4a1f28d18568b38dfdee9ff48bffe747953bd6a735ddb6c99f88c26092201aa4
                                                          • Opcode Fuzzy Hash: 8e1c27fa4a237ca7aef404305f49132a18adfe0583d54bc3fbc9a5ccdadbba82
                                                          • Instruction Fuzzy Hash: 72429B34204210AFDB20CF68DC48AAABBE5FF99310F15461DF699C72A1E771E8A1CF51
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 008248F3
                                                          • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00824908
                                                          • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00824927
                                                          • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0082494B
                                                          • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0082495C
                                                          • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0082497B
                                                          • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 008249AE
                                                          • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 008249D4
                                                          • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00824A0F
                                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00824A56
                                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00824A7E
                                                          • IsMenu.USER32(?), ref: 00824A97
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00824AF2
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00824B20
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00824B94
                                                          • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00824BE3
                                                          • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00824C82
                                                          • wsprintfW.USER32 ref: 00824CAE
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00824CC9
                                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 00824CF1
                                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00824D13
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00824D33
                                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 00824D5A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                          • String ID: %d/%02d/%02d
                                                          • API String ID: 4054740463-328681919
                                                          • Opcode ID: edb4de5e3187f90cae643dd2c3b3c54390316201f0945d61b1b17c38856496db
                                                          • Instruction ID: aa01ab2cd42fd019fba34516a20200475caa48fe33463ee4adb058d5fc8d755c
                                                          • Opcode Fuzzy Hash: edb4de5e3187f90cae643dd2c3b3c54390316201f0945d61b1b17c38856496db
                                                          • Instruction Fuzzy Hash: 3212D071500228ABEB248F28ED49FBE7BF8FF85714F105129F516DA2E1DB749981CB60
                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 007AF998
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007EF474
                                                          • IsIconic.USER32(00000000), ref: 007EF47D
                                                          • ShowWindow.USER32(00000000,00000009), ref: 007EF48A
                                                          • SetForegroundWindow.USER32(00000000), ref: 007EF494
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 007EF4AA
                                                          • GetCurrentThreadId.KERNEL32 ref: 007EF4B1
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 007EF4BD
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 007EF4CE
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 007EF4D6
                                                          • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 007EF4DE
                                                          • SetForegroundWindow.USER32(00000000), ref: 007EF4E1
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 007EF4F6
                                                          • keybd_event.USER32(00000012,00000000), ref: 007EF501
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 007EF50B
                                                          • keybd_event.USER32(00000012,00000000), ref: 007EF510
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 007EF519
                                                          • keybd_event.USER32(00000012,00000000), ref: 007EF51E
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 007EF528
                                                          • keybd_event.USER32(00000012,00000000), ref: 007EF52D
                                                          • SetForegroundWindow.USER32(00000000), ref: 007EF530
                                                          • AttachThreadInput.USER32(?,000000FF,00000000), ref: 007EF557
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 4125248594-2988720461
                                                          • Opcode ID: 6b7f21e4564a87992630fafc7180233029efae4f20c4479336457e120cb54a07
                                                          • Instruction ID: 2d3897dfa6400a26ca3d656342a7f540263c416d755d12ca45cc08510e494c5c
                                                          • Opcode Fuzzy Hash: 6b7f21e4564a87992630fafc7180233029efae4f20c4479336457e120cb54a07
                                                          • Instruction Fuzzy Hash: DD317471A40258BFEB316FB65C4AFBF7E6CFB48B50F104065FA01E61D1C6B49D11AAA0
                                                          APIs
                                                            • Part of subcall function 007F16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007F170D
                                                            • Part of subcall function 007F16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007F173A
                                                            • Part of subcall function 007F16C3: GetLastError.KERNEL32 ref: 007F174A
                                                          • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 007F1286
                                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 007F12A8
                                                          • CloseHandle.KERNEL32(?), ref: 007F12B9
                                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 007F12D1
                                                          • GetProcessWindowStation.USER32 ref: 007F12EA
                                                          • SetProcessWindowStation.USER32(00000000), ref: 007F12F4
                                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 007F1310
                                                            • Part of subcall function 007F10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007F11FC), ref: 007F10D4
                                                            • Part of subcall function 007F10BF: CloseHandle.KERNEL32(?,?,007F11FC), ref: 007F10E9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                          • String ID: $default$winsta0
                                                          • API String ID: 22674027-1027155976
                                                          • Opcode ID: a04b08c05eb3ad876032521ff719bd8002af9417b1d4d5256a1accf3c40f30fb
                                                          • Instruction ID: 3387e1024a864a21c27968c27e2409fcd3b485cac4c2bc1541e1bb20b1e3d2a2
                                                          • Opcode Fuzzy Hash: a04b08c05eb3ad876032521ff719bd8002af9417b1d4d5256a1accf3c40f30fb
                                                          • Instruction Fuzzy Hash: EA817871900249EFDF259FA8DC49BFE7BB9FF44704F148129FA11A62A0D7398945CB60
                                                          APIs
                                                            • Part of subcall function 007F10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007F1114
                                                            • Part of subcall function 007F10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1120
                                                            • Part of subcall function 007F10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F112F
                                                            • Part of subcall function 007F10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1136
                                                            • Part of subcall function 007F10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007F114D
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 007F0BCC
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 007F0C00
                                                          • GetLengthSid.ADVAPI32(?), ref: 007F0C17
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 007F0C51
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007F0C6D
                                                          • GetLengthSid.ADVAPI32(?), ref: 007F0C84
                                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 007F0C8C
                                                          • HeapAlloc.KERNEL32(00000000), ref: 007F0C93
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 007F0CB4
                                                          • CopySid.ADVAPI32(00000000), ref: 007F0CBB
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 007F0CEA
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007F0D0C
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007F0D1E
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0D45
                                                          • HeapFree.KERNEL32(00000000), ref: 007F0D4C
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0D55
                                                          • HeapFree.KERNEL32(00000000), ref: 007F0D5C
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0D65
                                                          • HeapFree.KERNEL32(00000000), ref: 007F0D6C
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 007F0D78
                                                          • HeapFree.KERNEL32(00000000), ref: 007F0D7F
                                                            • Part of subcall function 007F1193: GetProcessHeap.KERNEL32(00000008,007F0BB1,?,00000000,?,007F0BB1,?), ref: 007F11A1
                                                            • Part of subcall function 007F1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,007F0BB1,?), ref: 007F11A8
                                                            • Part of subcall function 007F1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,007F0BB1,?), ref: 007F11B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                          • String ID:
                                                          • API String ID: 4175595110-0
                                                          • Opcode ID: 0a216c6cba73808e4c9555374052ff55d141981cebfedf49c65bf6dfda41a37c
                                                          • Instruction ID: 87e917a45c0ed873d60f689c491700a57f99fa2e7f34f4774ee8ded026841f66
                                                          • Opcode Fuzzy Hash: 0a216c6cba73808e4c9555374052ff55d141981cebfedf49c65bf6dfda41a37c
                                                          • Instruction Fuzzy Hash: 00715C75A0020EABDF20DFA4DC45FFEBBB9BF04300F148515EA14A6392D775A906CBA0
                                                          APIs
                                                          • OpenClipboard.USER32(0082CC08), ref: 0080EB29
                                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 0080EB37
                                                          • GetClipboardData.USER32(0000000D), ref: 0080EB43
                                                          • CloseClipboard.USER32 ref: 0080EB4F
                                                          • GlobalLock.KERNEL32(00000000), ref: 0080EB87
                                                          • CloseClipboard.USER32 ref: 0080EB91
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0080EBBC
                                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 0080EBC9
                                                          • GetClipboardData.USER32(00000001), ref: 0080EBD1
                                                          • GlobalLock.KERNEL32(00000000), ref: 0080EBE2
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0080EC22
                                                          • IsClipboardFormatAvailable.USER32(0000000F), ref: 0080EC38
                                                          • GetClipboardData.USER32(0000000F), ref: 0080EC44
                                                          • GlobalLock.KERNEL32(00000000), ref: 0080EC55
                                                          • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0080EC77
                                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0080EC94
                                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0080ECD2
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0080ECF3
                                                          • CountClipboardFormats.USER32 ref: 0080ED14
                                                          • CloseClipboard.USER32 ref: 0080ED59
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                          • String ID:
                                                          • API String ID: 420908878-0
                                                          • Opcode ID: 5ae28e4d00a9c437e9ae791fc4b421f5cbb13a56e76bc9762b5e9ec11935ed50
                                                          • Instruction ID: 08ccb7095ff6cdc30b60d8fc6a226bf15b8074d5f3d69deb092d368a5544fbae
                                                          • Opcode Fuzzy Hash: 5ae28e4d00a9c437e9ae791fc4b421f5cbb13a56e76bc9762b5e9ec11935ed50
                                                          • Instruction Fuzzy Hash: E7619935204205AFD710EF28DC99E3AB7A4FF84714F04891DF856D72A2CB35E906CBA2
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 008069BE
                                                          • FindClose.KERNEL32(00000000), ref: 00806A12
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00806A4E
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00806A75
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00806AB2
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00806ADF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                          • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                          • API String ID: 3830820486-3289030164
                                                          • Opcode ID: 0d2922aba8d92f04852ee4b13451533b2b49aca18caf987190f0ca434c6d5c2d
                                                          • Instruction ID: a313c4aabc67a2b279c05082c132daf825af2ba28705b16824fafbaa467cbd9f
                                                          • Opcode Fuzzy Hash: 0d2922aba8d92f04852ee4b13451533b2b49aca18caf987190f0ca434c6d5c2d
                                                          • Instruction Fuzzy Hash: 37D15DB2508340EEC714EBA4DC85EABB7E8FF89704F44491DF585D6191EB38DA18CB62
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00809663
                                                          • GetFileAttributesW.KERNEL32(?), ref: 008096A1
                                                          • SetFileAttributesW.KERNEL32(?,?), ref: 008096BB
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 008096D3
                                                          • FindClose.KERNEL32(00000000), ref: 008096DE
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 008096FA
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0080974A
                                                          • SetCurrentDirectoryW.KERNEL32(00856B7C), ref: 00809768
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00809772
                                                          • FindClose.KERNEL32(00000000), ref: 0080977F
                                                          • FindClose.KERNEL32(00000000), ref: 0080978F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                          • String ID: *.*
                                                          • API String ID: 1409584000-438819550
                                                          • Opcode ID: 8550aa92e28889332113344556a5514fc490aa553ebbc1b9a30c2dabb81bcc6c
                                                          • Instruction ID: 65070dd117a2c54228a01f108d7f41920a9ec575a44ff318598d138c8820a665
                                                          • Opcode Fuzzy Hash: 8550aa92e28889332113344556a5514fc490aa553ebbc1b9a30c2dabb81bcc6c
                                                          • Instruction Fuzzy Hash: 1031F172541219AECB20EFB4EC09AEE77ACFF09320F108155F8A5E31E1EB35DE458A50
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 008097BE
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00809819
                                                          • FindClose.KERNEL32(00000000), ref: 00809824
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00809840
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00809890
                                                          • SetCurrentDirectoryW.KERNEL32(00856B7C), ref: 008098AE
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 008098B8
                                                          • FindClose.KERNEL32(00000000), ref: 008098C5
                                                          • FindClose.KERNEL32(00000000), ref: 008098D5
                                                            • Part of subcall function 007FDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 007FDB00
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                          • String ID: *.*
                                                          • API String ID: 2640511053-438819550
                                                          • Opcode ID: 84ece0104f62e23f9625e7732de773188bf5ca4b8466d2b086356c7fdfcde44b
                                                          • Instruction ID: 0b29b097577971a94591eb8085efcce5d01ab285b588696a001104242ea885fc
                                                          • Opcode Fuzzy Hash: 84ece0104f62e23f9625e7732de773188bf5ca4b8466d2b086356c7fdfcde44b
                                                          • Instruction Fuzzy Hash: 0431C571501619AEDB20EFB4EC48AEE77ACFF06320F108165E950E22D1DB35DD498A60
                                                          APIs
                                                            • Part of subcall function 0081C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0081B6AE,?,?), ref: 0081C9B5
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081C9F1
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA68
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0081BF3E
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 0081BFA9
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 0081BFCD
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0081C02C
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0081C0E7
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0081C154
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0081C1E9
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 0081C23A
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0081C2E3
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0081C382
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 0081C38F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                          • String ID:
                                                          • API String ID: 3102970594-0
                                                          • Opcode ID: 010a9c46b7a63d365a9f30fff7470c3309fd9befb94b86ea55eb7fc5b08fdcd8
                                                          • Instruction ID: 12042d6074a9fb7cef3ec8ba5b29fc551de4b4e5d705530a95eab6b8b37ad93a
                                                          • Opcode Fuzzy Hash: 010a9c46b7a63d365a9f30fff7470c3309fd9befb94b86ea55eb7fc5b08fdcd8
                                                          • Instruction Fuzzy Hash: FF022C71604200AFD714DF28C895E6ABBE9FF49318F18849DF45ACB2A2DB31ED46CB51
                                                          APIs
                                                          • GetLocalTime.KERNEL32(?), ref: 00808257
                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00808267
                                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00808273
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00808310
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00808324
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00808356
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0080838C
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00808395
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryTime$File$Local$System
                                                          • String ID: *.*
                                                          • API String ID: 1464919966-438819550
                                                          • Opcode ID: 32df0a72be52f69511aaaaceba6651a46850aa2783d903c11f00402401511753
                                                          • Instruction ID: b0d016f65493d0c55fbcc146c4f6b2bc6410b579ce76592a819203a6967cd945
                                                          • Opcode Fuzzy Hash: 32df0a72be52f69511aaaaceba6651a46850aa2783d903c11f00402401511753
                                                          • Instruction Fuzzy Hash: CE615972508705DFCB10EF64D8449AEB3E8FF89314F04892AF999C7291EB35E945CB92
                                                          APIs
                                                            • Part of subcall function 00793AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00793A97,?,?,00792E7F,?,?,?,00000000), ref: 00793AC2
                                                            • Part of subcall function 007FE199: GetFileAttributesW.KERNEL32(?,007FCF95), ref: 007FE19A
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 007FD122
                                                          • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 007FD1DD
                                                          • MoveFileW.KERNEL32(?,?), ref: 007FD1F0
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 007FD20D
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 007FD237
                                                            • Part of subcall function 007FD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,007FD21C,?,?), ref: 007FD2B2
                                                          • FindClose.KERNEL32(00000000,?,?,?), ref: 007FD253
                                                          • FindClose.KERNEL32(00000000), ref: 007FD264
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 1946585618-1173974218
                                                          • Opcode ID: 3f0aaebfc227b29100fca08829198ac24a58a8f8e23cada6bf91ddfd719af62b
                                                          • Instruction ID: 04191d91f9bf6f52465efc0b8b95500bf80acb6f9107eb32e1f83c98e7282544
                                                          • Opcode Fuzzy Hash: 3f0aaebfc227b29100fca08829198ac24a58a8f8e23cada6bf91ddfd719af62b
                                                          • Instruction Fuzzy Hash: 6F617C3180110DEACF15EBE4DA969FDB7B6BF15300F208169E50177291EB396F09CBA1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                          • String ID:
                                                          • API String ID: 1737998785-0
                                                          • Opcode ID: bc61fa30c478d5a84f4bcd1d00fed7fb2bbd9dfe08766cfc104d6bf549784e87
                                                          • Instruction ID: bb1eecc316680dd2c4aec7f9a0ed8a77d646f7ab90a8dda14c185d0832c2ce75
                                                          • Opcode Fuzzy Hash: bc61fa30c478d5a84f4bcd1d00fed7fb2bbd9dfe08766cfc104d6bf549784e87
                                                          • Instruction Fuzzy Hash: 8C417E35204611DFE760DF15D848B2ABBA5FF44318F58C499E819CB6A2C775EC42CB90
                                                          APIs
                                                            • Part of subcall function 007F16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007F170D
                                                            • Part of subcall function 007F16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007F173A
                                                            • Part of subcall function 007F16C3: GetLastError.KERNEL32 ref: 007F174A
                                                          • ExitWindowsEx.USER32(?,00000000), ref: 007FE932
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                          • String ID: $ $@$SeShutdownPrivilege
                                                          • API String ID: 2234035333-3163812486
                                                          • Opcode ID: cbca14323ac431514cfdfab91b27f15428a74acb46d8b259b3216f3807c9c733
                                                          • Instruction ID: 44afdb9294037cbc9a906ebf56e6d56622e1916894a42899d225520d93447870
                                                          • Opcode Fuzzy Hash: cbca14323ac431514cfdfab91b27f15428a74acb46d8b259b3216f3807c9c733
                                                          • Instruction Fuzzy Hash: A201DB72610219EBEB64A7749C89FBF729CAB14751F154521FE12E23E1D9E86C4081B1
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000001,00000006), ref: 00811276
                                                          • WSAGetLastError.WSOCK32 ref: 00811283
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 008112BA
                                                          • WSAGetLastError.WSOCK32 ref: 008112C5
                                                          • closesocket.WSOCK32(00000000), ref: 008112F4
                                                          • listen.WSOCK32(00000000,00000005), ref: 00811303
                                                          • WSAGetLastError.WSOCK32 ref: 0081130D
                                                          • closesocket.WSOCK32(00000000), ref: 0081133C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$closesocket$bindlistensocket
                                                          • String ID:
                                                          • API String ID: 540024437-0
                                                          • Opcode ID: bebaa16c9be4a17a5c868d2b6a6b1432acfdc221606e342b04ff5708daa9747a
                                                          • Instruction ID: ec508aa8479262f5f4677ec24c773585f7a1b135f74fdd559990848d93d8cff5
                                                          • Opcode Fuzzy Hash: bebaa16c9be4a17a5c868d2b6a6b1432acfdc221606e342b04ff5708daa9747a
                                                          • Instruction Fuzzy Hash: DB417D316001409FDB20DF24D488B69BBEAFF46318F18C198E9569F296C775EC82CBA1
                                                          APIs
                                                          • _free.LIBCMT ref: 007CB9D4
                                                          • _free.LIBCMT ref: 007CB9F8
                                                          • _free.LIBCMT ref: 007CBB7F
                                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00833700), ref: 007CBB91
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0086121C,000000FF,00000000,0000003F,00000000,?,?), ref: 007CBC09
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00861270,000000FF,?,0000003F,00000000,?), ref: 007CBC36
                                                          • _free.LIBCMT ref: 007CBD4B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                          • String ID:
                                                          • API String ID: 314583886-0
                                                          • Opcode ID: f0f83d5ba156fc6e36c9842b2e77a3e82640d87c461eca8f39295cca28a3c2ad
                                                          • Instruction ID: c040b7bcb7146d72ae5fd9d27295ca4566313aa01105d86901d4eb17b2553b6f
                                                          • Opcode Fuzzy Hash: f0f83d5ba156fc6e36c9842b2e77a3e82640d87c461eca8f39295cca28a3c2ad
                                                          • Instruction Fuzzy Hash: C7C10471A04244EFCB20DF688C5AFAEBBA9EF41310F18419EF591D7252EB389E41CB50
                                                          APIs
                                                            • Part of subcall function 00793AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00793A97,?,?,00792E7F,?,?,?,00000000), ref: 00793AC2
                                                            • Part of subcall function 007FE199: GetFileAttributesW.KERNEL32(?,007FCF95), ref: 007FE19A
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 007FD420
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 007FD470
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 007FD481
                                                          • FindClose.KERNEL32(00000000), ref: 007FD498
                                                          • FindClose.KERNEL32(00000000), ref: 007FD4A1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 2649000838-1173974218
                                                          • Opcode ID: 5d29e3602c3ceacac4ada50f09f09f57b2f410069520c73429460c04c078f4d1
                                                          • Instruction ID: 1c9008397c8bd582ac5b724000111ff6edef299f1866e6f7b06a465acd0feab2
                                                          • Opcode Fuzzy Hash: 5d29e3602c3ceacac4ada50f09f09f57b2f410069520c73429460c04c078f4d1
                                                          • Instruction Fuzzy Hash: B3319031008385EBC710EF64D8558BFB7E9BE91314F408A1DF9D593291EB28AE09D763
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: __floor_pentium4
                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                          • API String ID: 4168288129-2761157908
                                                          • Opcode ID: 040a8d22a5d9694257d84049090ac90afc9f993267212bf8d046ac6ac37b54c7
                                                          • Instruction ID: e5beb4df6eaee2b1ac73ac987d046b2329fc44e2ec0222b5e6bd4f1170046017
                                                          • Opcode Fuzzy Hash: 040a8d22a5d9694257d84049090ac90afc9f993267212bf8d046ac6ac37b54c7
                                                          • Instruction Fuzzy Hash: FBC21B72E046288FDB25CE28DD45BEAB7B6EB48305F1541EED44DE7241E778AE818F40
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 008064DC
                                                          • CoInitialize.OLE32(00000000), ref: 00806639
                                                          • CoCreateInstance.OLE32(0082FCF8,00000000,00000001,0082FB68,?), ref: 00806650
                                                          • CoUninitialize.OLE32 ref: 008068D4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 886957087-24824748
                                                          • Opcode ID: b605831bc5631adc4cd5d4d1ee6cfe9ca56e840d3c380a2227d88499d22125dd
                                                          • Instruction ID: beb57eb1727d87fd2c3c3f3300dd572f8244e3ba3f83329b05d8510d25f6ca2b
                                                          • Opcode Fuzzy Hash: b605831bc5631adc4cd5d4d1ee6cfe9ca56e840d3c380a2227d88499d22125dd
                                                          • Instruction Fuzzy Hash: F7D16771508201AFD714EF24D885E6BB7E9FF98704F00492DF595CB2A1EB30E919CBA2
                                                          APIs
                                                          • GetForegroundWindow.USER32(?,?,00000000), ref: 008122E8
                                                            • Part of subcall function 0080E4EC: GetWindowRect.USER32(?,?), ref: 0080E504
                                                          • GetDesktopWindow.USER32 ref: 00812312
                                                          • GetWindowRect.USER32(00000000), ref: 00812319
                                                          • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00812355
                                                          • GetCursorPos.USER32(?), ref: 00812381
                                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 008123DF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                          • String ID:
                                                          • API String ID: 2387181109-0
                                                          • Opcode ID: 3883cd3fe4416972d765208692fc5be3b334f74f4f4e1f87a13a0b98d35c62ae
                                                          • Instruction ID: a0ddd38641ed2b6b1a5b319bf4f7ad8d41003acb4e425e3e97b7a2aa16909f1e
                                                          • Opcode Fuzzy Hash: 3883cd3fe4416972d765208692fc5be3b334f74f4f4e1f87a13a0b98d35c62ae
                                                          • Instruction Fuzzy Hash: 3231FC72104305AFC720DF14C848BABBBADFF88314F000A19F994D72A1DB34EA59CB92
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                          • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00809B78
                                                          • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00809C8B
                                                            • Part of subcall function 00803874: GetInputState.USER32 ref: 008038CB
                                                            • Part of subcall function 00803874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00803966
                                                          • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00809BA8
                                                          • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00809C75
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                          • String ID: *.*
                                                          • API String ID: 1972594611-438819550
                                                          • Opcode ID: f0c218b7ce49d364968849ab756b7f5bea74864ec069f06cbcc37ad9369d9368
                                                          • Instruction ID: 550ddd6c60c5b4e53ac3df685cfc47eba43177a81d3869b04e318d8a7dab7795
                                                          • Opcode Fuzzy Hash: f0c218b7ce49d364968849ab756b7f5bea74864ec069f06cbcc37ad9369d9368
                                                          • Instruction Fuzzy Hash: C3415D7190020AAFDF54DF64DC49AEEBBB8FF05310F248156E855E2192EB349E84CB61
                                                          APIs
                                                            • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 007A9A4E
                                                          • GetSysColor.USER32(0000000F), ref: 007A9B23
                                                          • SetBkColor.GDI32(?,00000000), ref: 007A9B36
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$LongProcWindow
                                                          • String ID:
                                                          • API String ID: 3131106179-0
                                                          • Opcode ID: 036f94cbefc01d2c5606c28b173e987d4b8a19b98a5e29c31a194aba90634a71
                                                          • Instruction ID: b70c9863afa87f6ccf1faf51e98147ac3fd007f0a3af4b3cf04d8856e6dfc925
                                                          • Opcode Fuzzy Hash: 036f94cbefc01d2c5606c28b173e987d4b8a19b98a5e29c31a194aba90634a71
                                                          • Instruction Fuzzy Hash: 77A12B7010A454BEE72C9A3D9C4DE7B3A9DFBC7344F15830AF602C6692CA2D9D61D272
                                                          APIs
                                                            • Part of subcall function 0081304E: inet_addr.WSOCK32(?), ref: 0081307A
                                                            • Part of subcall function 0081304E: _wcslen.LIBCMT ref: 0081309B
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 0081185D
                                                          • WSAGetLastError.WSOCK32 ref: 00811884
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 008118DB
                                                          • WSAGetLastError.WSOCK32 ref: 008118E6
                                                          • closesocket.WSOCK32(00000000), ref: 00811915
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 1601658205-0
                                                          • Opcode ID: 3308bc399637b6b9ebfd79aae8713a9d7c012759f3e03209a9adc9cd533cb877
                                                          • Instruction ID: f63b7758ce9b8d65172c948cf763552459ad3228474c2798a17fdccd5dfe83ab
                                                          • Opcode Fuzzy Hash: 3308bc399637b6b9ebfd79aae8713a9d7c012759f3e03209a9adc9cd533cb877
                                                          • Instruction Fuzzy Hash: 7351C271A002009FDB10AF24D88AF6A77E5EF49718F48C558F9059F3C3D775AD418BA1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                          • String ID:
                                                          • API String ID: 292994002-0
                                                          • Opcode ID: 98ea4ea99eadce403d756770178522df59f1c7064fc5637b465e299b4bf32a5a
                                                          • Instruction ID: e7a45d9df50a8f6afc4c8049a6f61efacfb05bd5c490f97fba0936bd961baa57
                                                          • Opcode Fuzzy Hash: 98ea4ea99eadce403d756770178522df59f1c7064fc5637b465e299b4bf32a5a
                                                          • Instruction Fuzzy Hash: C221F9357402209FDB218F1AE848B2A7BE5FFA5314F69806CE846CB351C775EC82CB90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                          • API String ID: 0-1546025612
                                                          • Opcode ID: 051add98d6b3c9d7ae63df98d26b7f7a0fb879394e2b73a67e34d138380520ec
                                                          • Instruction ID: 974301e3b955ccde248a0c0b1c79022884b9df21816303eb6f9641f88a0bfc86
                                                          • Opcode Fuzzy Hash: 051add98d6b3c9d7ae63df98d26b7f7a0fb879394e2b73a67e34d138380520ec
                                                          • Instruction Fuzzy Hash: F3A29271E0061ACBDF64CF58D8407AEB7B1BF55310F2481AAE815AB385EB789D81CF91
                                                          APIs
                                                          • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 007FAAAC
                                                          • SetKeyboardState.USER32(00000080), ref: 007FAAC8
                                                          • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 007FAB36
                                                          • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 007FAB88
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: de20f5250952d737e07ac6df9216d8410b755cb179ec3e2ee8e76389e1deb8fa
                                                          • Instruction ID: 1f00a8ae82c701095f22f29554fd7c022c8e3aea95d727f8a43e854d9f88cf4a
                                                          • Opcode Fuzzy Hash: de20f5250952d737e07ac6df9216d8410b755cb179ec3e2ee8e76389e1deb8fa
                                                          • Instruction Fuzzy Hash: 2431E7F0A4024CBEFF358A64CC05BFA7BA6BB44320F04821AE689567D1D37D8985D762
                                                          APIs
                                                          • InternetReadFile.WININET(?,?,00000400,?), ref: 0080CE89
                                                          • GetLastError.KERNEL32(?,00000000), ref: 0080CEEA
                                                          • SetEvent.KERNEL32(?,?,00000000), ref: 0080CEFE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorEventFileInternetLastRead
                                                          • String ID:
                                                          • API String ID: 234945975-0
                                                          • Opcode ID: fc2d3c9b1324e93e1d29ee5bf9addd2fed7c7428079ddd1231df8fd9192937a7
                                                          • Instruction ID: d1d93d45a02faf7428e7540e0cafd90b1009604fe8d440e13d7199934aa59bf5
                                                          • Opcode Fuzzy Hash: fc2d3c9b1324e93e1d29ee5bf9addd2fed7c7428079ddd1231df8fd9192937a7
                                                          • Instruction Fuzzy Hash: D7217AB1500605DBD7709F65CD48BAA77F8FB40358F20862AE646D2191EB74AA058B64
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 007F82AA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: lstrlen
                                                          • String ID: ($|
                                                          • API String ID: 1659193697-1631851259
                                                          • Opcode ID: 008f718cb5ad062ee4719f6b50894f6f44006b79cfb501adb923cdaa81fd8394
                                                          • Instruction ID: f3f586babdcf63c422f9b535bde0ecd80988facaba6187fdb36a02a3e08385b2
                                                          • Opcode Fuzzy Hash: 008f718cb5ad062ee4719f6b50894f6f44006b79cfb501adb923cdaa81fd8394
                                                          • Instruction Fuzzy Hash: 20325574A00609DFCB68CF59C081A6AB7F0FF48710B11C56EE59ADB3A1EB74E981CB41
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00805CC1
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00805D17
                                                          • FindClose.KERNEL32(?), ref: 00805D5F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstNext
                                                          • String ID:
                                                          • API String ID: 3541575487-0
                                                          • Opcode ID: f59679abb8dd50f988c97685b7f54282772166f3d570ec279c393996468aff06
                                                          • Instruction ID: 1b584282d0d0c11570c916a7912afcbcbdf790f4cc136098794888e3fe6cd250
                                                          • Opcode Fuzzy Hash: f59679abb8dd50f988c97685b7f54282772166f3d570ec279c393996468aff06
                                                          • Instruction Fuzzy Hash: B9518675604A01DFC714CF28D898A9AB7E4FF49324F14856EE95A8B3A1DB34E904CFA1
                                                          APIs
                                                          • IsDebuggerPresent.KERNEL32 ref: 007C271A
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 007C2724
                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 007C2731
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                          • String ID:
                                                          • API String ID: 3906539128-0
                                                          • Opcode ID: 4a7e32e5f07ae824d0e7368e204ca651bda278b7e892be04feac4c950d4fa74b
                                                          • Instruction ID: 780563e998dfa7772f88585cf3f37d0919f7075f99a8be88ac9f6dc6cd9ab461
                                                          • Opcode Fuzzy Hash: 4a7e32e5f07ae824d0e7368e204ca651bda278b7e892be04feac4c950d4fa74b
                                                          • Instruction Fuzzy Hash: A231B4749112189BCB21DF64DC89BDDB7B8BF08310F5085EAE41CA7261E7749F818F45
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 008051DA
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00805238
                                                          • SetErrorMode.KERNEL32(00000000), ref: 008052A1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID:
                                                          • API String ID: 1682464887-0
                                                          • Opcode ID: fd0e58ccfd64a58ea1dfdc47e4942650a3ebb4c1ea7da8d16976e2dba34e51d9
                                                          • Instruction ID: 890025b381fc7699ee46f775be1d96a3fa3ba8f6cc3f18d4cd79616bd6c6c4d4
                                                          • Opcode Fuzzy Hash: fd0e58ccfd64a58ea1dfdc47e4942650a3ebb4c1ea7da8d16976e2dba34e51d9
                                                          • Instruction Fuzzy Hash: DD316175A00518DFDB00DF54D889EAEBBB5FF49314F088099E805AB3A2DB35EC56CB60
                                                          APIs
                                                            • Part of subcall function 007AFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 007B0668
                                                            • Part of subcall function 007AFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 007B0685
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007F170D
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007F173A
                                                          • GetLastError.KERNEL32 ref: 007F174A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                          • String ID:
                                                          • API String ID: 577356006-0
                                                          • Opcode ID: 68bf4b9264ee86f1aace78bdc150c6a3598ec2188dc861175f25699a0e09ed20
                                                          • Instruction ID: ef6196f6097aa1db0fd88c95e6ca1b2591b41ae3d9721b91fb176a5806414b14
                                                          • Opcode Fuzzy Hash: 68bf4b9264ee86f1aace78bdc150c6a3598ec2188dc861175f25699a0e09ed20
                                                          • Instruction Fuzzy Hash: 0A1191B2504308EFE728AF54DC8AD7AB7B9FB44714B20852EE05657241EB74BC428A60
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 007FD608
                                                          • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 007FD645
                                                          • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 007FD650
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseControlCreateDeviceFileHandle
                                                          • String ID:
                                                          • API String ID: 33631002-0
                                                          • Opcode ID: d7a1dd615730675d6d5e6a610dfa4485c7c90ca19978b5d668789ef948444176
                                                          • Instruction ID: ceda65a3643ee56a87b00c06d9ac2d41906b3d8ea8a9085e41cf698d49147944
                                                          • Opcode Fuzzy Hash: d7a1dd615730675d6d5e6a610dfa4485c7c90ca19978b5d668789ef948444176
                                                          • Instruction Fuzzy Hash: 57115E75E05228BFDB208F95DC45FAFBBBCEB45B60F108115F904E7290D6704E058BA1
                                                          APIs
                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 007F168C
                                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 007F16A1
                                                          • FreeSid.ADVAPI32(?), ref: 007F16B1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                                          • String ID:
                                                          • API String ID: 3429775523-0
                                                          • Opcode ID: d0a9ad561a2830413aa48fe6f6edc19e37552e72bb4f9d8af9b3ae48ee94f896
                                                          • Instruction ID: c75f1e9fb1eb370896fca2c36a82ce850ef8f056b3d8528975d299b4ddba53a5
                                                          • Opcode Fuzzy Hash: d0a9ad561a2830413aa48fe6f6edc19e37552e72bb4f9d8af9b3ae48ee94f896
                                                          • Instruction Fuzzy Hash: 64F0F47195030DFBDB00DFE49C89EAEBBBCFB08644F508565E501E2181E774AA448A54
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: /
                                                          • API String ID: 0-2043925204
                                                          • Opcode ID: ab424bdb86812d032fd0c2b1dd3f03be1f1f407dbc33e69a96f008c28fdc797a
                                                          • Instruction ID: 8c84becdab953e581fd0b47bbe2f7be070efc48bf629b54f3b1b32fdf9e9749a
                                                          • Opcode Fuzzy Hash: ab424bdb86812d032fd0c2b1dd3f03be1f1f407dbc33e69a96f008c28fdc797a
                                                          • Instruction Fuzzy Hash: 3A412872500659AFCB249FB9DC49FBB77B8EB84354F1082ADF909D7180E6749D41CB50
                                                          APIs
                                                          • GetUserNameW.ADVAPI32(?,?), ref: 007ED28C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: NameUser
                                                          • String ID: X64
                                                          • API String ID: 2645101109-893830106
                                                          • Opcode ID: 2fcb3a19c7681df6c7b204ce926db805514b581c842818ef31c1b02933d86dc6
                                                          • Instruction ID: c38ff2dd1a63394ed9207fa7c204da530f5b596025507abcc9c54323b8bdd79a
                                                          • Opcode Fuzzy Hash: 2fcb3a19c7681df6c7b204ce926db805514b581c842818ef31c1b02933d86dc6
                                                          • Instruction Fuzzy Hash: 88D0C9B480111DEACBA4CB90DC88DDEB37CBB14305F104251F106A2000D77499498F10
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                          • Instruction ID: e0cbd1430cf070e8dfb52b5acbaaa1763c9e92cae761eed0445aa402b99277fe
                                                          • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                          • Instruction Fuzzy Hash: 5E021C72E001199FDF15CFA9C8807EEBBF1EF48314F25816AE919EB380D735A9418B94
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00806918
                                                          • FindClose.KERNEL32(00000000), ref: 00806961
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: d6abdc19e7abf7807af4cf8dd5c7619729af767d37a509e0477d25a498e29685
                                                          • Instruction ID: 4f3ed29d8fe1fb562be3b48a4a3c94ea199503b043321a3eea4d22f664cdf527
                                                          • Opcode Fuzzy Hash: d6abdc19e7abf7807af4cf8dd5c7619729af767d37a509e0477d25a498e29685
                                                          • Instruction Fuzzy Hash: BB119332614201DFCB10DF29D888A16BBE5FF85328F14C699F4698F6A2DB34EC15CB91
                                                          APIs
                                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00814891,?,?,00000035,?), ref: 008037E4
                                                          • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00814891,?,?,00000035,?), ref: 008037F4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorFormatLastMessage
                                                          • String ID:
                                                          • API String ID: 3479602957-0
                                                          • Opcode ID: 188b1051aec37c2cee09fc0871b787c98e8ef30854857812c55f46482ee7e116
                                                          • Instruction ID: 3889dacd2ad7a5fafc9f8679eae46027775b29a632907978cc72eb95dce59253
                                                          • Opcode Fuzzy Hash: 188b1051aec37c2cee09fc0871b787c98e8ef30854857812c55f46482ee7e116
                                                          • Instruction Fuzzy Hash: F3F0E5B06052286AEB6057B69C4DFEB3AAEFFC9761F000275F509D22C1D9609904C6B0
                                                          APIs
                                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 007FB25D
                                                          • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 007FB270
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: InputSendkeybd_event
                                                          • String ID:
                                                          • API String ID: 3536248340-0
                                                          • Opcode ID: 7fe0650316488195a7fc32019b2272c822e06ddc6d94b264344fef12992ac37c
                                                          • Instruction ID: c890560050e39cb5da56cec97c4e80f032d5998e1d0e280e7561d9cf75e16b3a
                                                          • Opcode Fuzzy Hash: 7fe0650316488195a7fc32019b2272c822e06ddc6d94b264344fef12992ac37c
                                                          • Instruction Fuzzy Hash: A1F01D7180424DABDF159FA4C805BBE7BB4FF08305F108009F955A5191C37DC6119F94
                                                          APIs
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007F11FC), ref: 007F10D4
                                                          • CloseHandle.KERNEL32(?,?,007F11FC), ref: 007F10E9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                          • String ID:
                                                          • API String ID: 81990902-0
                                                          • Opcode ID: f1b9a4fc37b235653f16c30e3f11ec2d0849246c7328fad8c7439fa35962e1c4
                                                          • Instruction ID: 43d6fbc30e1f94a128e218c52d6d5e078cd3779ee0c2f0cf7dd09f5a5f6ea8c1
                                                          • Opcode Fuzzy Hash: f1b9a4fc37b235653f16c30e3f11ec2d0849246c7328fad8c7439fa35962e1c4
                                                          • Instruction Fuzzy Hash: 0FE04F32008600EEE7352B61FC09E7777E9FB04320F20C92DF5A5804B1DB626CA1DB54
                                                          Strings
                                                          • Variable is not of type 'Object'., xrefs: 007E0C40
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Variable is not of type 'Object'.
                                                          • API String ID: 0-1840281001
                                                          • Opcode ID: 2b54aed8b405e40f453eaca81005fc276ced74669ed8c5009bff0f9d00f35374
                                                          • Instruction ID: 507e7acc3c452a09c9c0fc598bffc05bd2948282b38a2d22031383c958972cb0
                                                          • Opcode Fuzzy Hash: 2b54aed8b405e40f453eaca81005fc276ced74669ed8c5009bff0f9d00f35374
                                                          • Instruction Fuzzy Hash: DA32B071A00218DFCF15DF94E985AEDB7B5FF09304F244069E806AB292D77DAE45CBA0
                                                          APIs
                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,007C6766,?,?,00000008,?,?,007CFEFE,00000000), ref: 007C6998
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionRaise
                                                          • String ID:
                                                          • API String ID: 3997070919-0
                                                          • Opcode ID: 7b736a1ccc8499ea28f7003dde5faa1d8b0e5c8489394a21404660dc3c9aa918
                                                          • Instruction ID: 6b35f7d625804dd395cd3bf9883673a4bb02331b3f18c55017d697f8069cdddc
                                                          • Opcode Fuzzy Hash: 7b736a1ccc8499ea28f7003dde5faa1d8b0e5c8489394a21404660dc3c9aa918
                                                          • Instruction Fuzzy Hash: 4BB107716106099FDB15CF28C4CAB697BE0FF45364F25865CE89ACF2A2C739E991CB40
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID: 0-3916222277
                                                          • Opcode ID: 4e01ffd66aa36933cd08493481b97d94988c031fc088e80b661f51aed07c6675
                                                          • Instruction ID: 6412c816050d989cc5dbc7c8e72aa33196b09ee8131d5c21f221eaea0b2b5c78
                                                          • Opcode Fuzzy Hash: 4e01ffd66aa36933cd08493481b97d94988c031fc088e80b661f51aed07c6675
                                                          • Instruction Fuzzy Hash: 60126F71900269DFCB54CF59C8806EEB7B5FF49310F14819AE849EB256EB389E81CF91
                                                          APIs
                                                          • BlockInput.USER32(00000001), ref: 0080EABD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: BlockInput
                                                          • String ID:
                                                          • API String ID: 3456056419-0
                                                          • Opcode ID: 09e48e417e2591a64ef18b34ddaf1837d8fbfcce689932befd7aa253da765fab
                                                          • Instruction ID: 98c47bc4ab179aef1765087e19e3ac59249e204c95f8fceb7449949a83d97e0d
                                                          • Opcode Fuzzy Hash: 09e48e417e2591a64ef18b34ddaf1837d8fbfcce689932befd7aa253da765fab
                                                          • Instruction Fuzzy Hash: 0BE012322002149FCB10DF59E804D5AB7D9FF68760F008416FC49C7291D674A8418B90
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,007B03EE), ref: 007B09DA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: 49b1095928e32ec75f4a990dd89f606cb14c53f72592c42b25949635472b9435
                                                          • Instruction ID: af1bc35d23e2399a57af8c80792b50b17d8556278b317bb58204e7ba9afe0d3b
                                                          • Opcode Fuzzy Hash: 49b1095928e32ec75f4a990dd89f606cb14c53f72592c42b25949635472b9435
                                                          • Instruction Fuzzy Hash:
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0
                                                          • API String ID: 0-4108050209
                                                          • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                          • Instruction ID: 0947600d16f4d78c414a9cbbe09c27318584e10632c7905776673dbe026ad83c
                                                          • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                          • Instruction Fuzzy Hash: 7351797160C7459BDF3C8978889EBFE67999BD2340F180909E882DB282CA1DFE41D356
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4d40947ff133f29ebf7e240fe3130261925376357d5435024e5d79e1941fb9a6
                                                          • Instruction ID: 85f66951ecf42f89dd533548d2212f61aea9f79617c4cc87209f7d6fd2982288
                                                          • Opcode Fuzzy Hash: 4d40947ff133f29ebf7e240fe3130261925376357d5435024e5d79e1941fb9a6
                                                          • Instruction Fuzzy Hash: EE322032D29F414DD7279634D822335A789AFB73D5F14DB2BE81AB59A6EF29C4838100
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b0528c00a0ea134341c0f7129c3503537aac65a79db9f4ada00f9886ab377383
                                                          • Instruction ID: 75338121a62093a7d4497d064214123989f63b6e272ad52ed86cbdcba671e2b5
                                                          • Opcode Fuzzy Hash: b0528c00a0ea134341c0f7129c3503537aac65a79db9f4ada00f9886ab377383
                                                          • Instruction Fuzzy Hash: BC326C35A052859FDF2BCF2AC49067D77A1EB8E310F28866AD449CB291D63CDD83DB11
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9131cf9fbcfbab0b617802ae1366e44b93b5a9c5b3433b094069e135de1c5db2
                                                          • Instruction ID: e4474a663191a78b494dd3bac9cbd92e27d1316545f0dfafaffed3733b68b348
                                                          • Opcode Fuzzy Hash: 9131cf9fbcfbab0b617802ae1366e44b93b5a9c5b3433b094069e135de1c5db2
                                                          • Instruction Fuzzy Hash: 392291B0A04609DFDF14DFA8D885AAEB7B5FF44300F14462AE816A7391EB39ED15CB50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ed4bc75cdd91781f7a7381b8f64eaf7411f9eafb95e6f91240df4e3e10b0d00d
                                                          • Instruction ID: 210afb9fe1647cd6d29311d207cb8bf91705a387fdff33469fcb0ae1766e5990
                                                          • Opcode Fuzzy Hash: ed4bc75cdd91781f7a7381b8f64eaf7411f9eafb95e6f91240df4e3e10b0d00d
                                                          • Instruction Fuzzy Hash: 5E02A8B1E00205EBDF05EF64D885AADB7B1FF44300F11816AE9169B391EB39EE51CB91
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fe9e0a549b0a17cb889c6c51d82349f0ed81e6a4dc3097177b813c58be7ac577
                                                          • Instruction ID: d50a71d2ab997734502fa7184cb3b6cf1a394dff8fc74e8a311b8fcbe152bc39
                                                          • Opcode Fuzzy Hash: fe9e0a549b0a17cb889c6c51d82349f0ed81e6a4dc3097177b813c58be7ac577
                                                          • Instruction Fuzzy Hash: 63B1DF20D2AF414DD62396399831336B65CBFFB6D5F91DB1BFC1674E22EB2686834140
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                          • Instruction ID: b6c65f68496dda2495bb1f60ab21c3b12370484ba0811112d50b7dc273c86e36
                                                          • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                          • Instruction Fuzzy Hash: EF918A722090E34EDB29463D85742BEFFE15A523A23DA079DD4F2CB1C5FE18D554D620
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                          • Instruction ID: e15677cf5abb354c37d063c178826bda3c72f5755b7c967f213b0117db2a9079
                                                          • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                          • Instruction Fuzzy Hash: 3D91977220A0E74DDB69423D84342BEFFE15A923A135A079DE4F2CB1C6EE28D955D720
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                          • Instruction ID: c77933ce8837816d6e62b04d9da987beeba9cce0451de227ad0e909aeebd0472
                                                          • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                          • Instruction Fuzzy Hash: A191C7722090E34EDB2D427A84782BEFFE15A923A13DA479ED4F2CA1C5FE18D554D620
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 12b8504087a163d646630f09cf2a35f81b020ecc2536e77996d1d30addf6ac54
                                                          • Instruction ID: 16c4990eaf2a9a89a6afe561cc9cba91634638a96ce7b68e5c2ea0361c09ff1d
                                                          • Opcode Fuzzy Hash: 12b8504087a163d646630f09cf2a35f81b020ecc2536e77996d1d30addf6ac54
                                                          • Instruction Fuzzy Hash: 6F6158B1208709A6DE7C9A2C8C99BFF2398DFC1700F14491DF942DB2C1DA1D9E42CB66
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 89a6b251be4824c88ac4787686f845362f13458f8295febdba4076e57b2f6a6e
                                                          • Instruction ID: 7a8325083ccde233944252fb85974602253e76dee0ee42e630ffc4a263ba0a50
                                                          • Opcode Fuzzy Hash: 89a6b251be4824c88ac4787686f845362f13458f8295febdba4076e57b2f6a6e
                                                          • Instruction Fuzzy Hash: 5E616B7170870996DE3C5A2888AABFF2398DFC2784F140959E943DF681DA1EED42C356
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                          • Instruction ID: 5476f6c61ce6310007842f3624b7063137bca70e0b115320b0732fc79c2f3415
                                                          • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                          • Instruction Fuzzy Hash: FC8186336090E349DB2D423A85346BEFFE16A923B13DA079DD4F2CB1C1EE28D554D620
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4e5afb15ee16d1dff8589335a9f855b007da7de51d2b1d997130f622bee49108
                                                          • Instruction ID: 2de44db092f6c16f8ef519faeb430bbc6009c0fa534deaaf62e2f36868b44145
                                                          • Opcode Fuzzy Hash: 4e5afb15ee16d1dff8589335a9f855b007da7de51d2b1d997130f622bee49108
                                                          • Instruction Fuzzy Hash: 3E21A8326206118BD728CE79C81667A73E5F764310F15866EE4A7C37D0DE75A904CB40
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00812B30
                                                          • DeleteObject.GDI32(00000000), ref: 00812B43
                                                          • DestroyWindow.USER32 ref: 00812B52
                                                          • GetDesktopWindow.USER32 ref: 00812B6D
                                                          • GetWindowRect.USER32(00000000), ref: 00812B74
                                                          • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00812CA3
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00812CB1
                                                          • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812CF8
                                                          • GetClientRect.USER32(00000000,?), ref: 00812D04
                                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00812D40
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812D62
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812D75
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812D80
                                                          • GlobalLock.KERNEL32(00000000), ref: 00812D89
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812D98
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00812DA1
                                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812DA8
                                                          • GlobalFree.KERNEL32(00000000), ref: 00812DB3
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812DC5
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,0082FC38,00000000), ref: 00812DDB
                                                          • GlobalFree.KERNEL32(00000000), ref: 00812DEB
                                                          • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00812E11
                                                          • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00812E30
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812E52
                                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0081303F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                          • String ID: $AutoIt v3$DISPLAY$static
                                                          • API String ID: 2211948467-2373415609
                                                          • Opcode ID: 5cd08b1563c148fd53f4d0e7b7a8c5211d132cddc9e3fa82e970d7ecf8881b6b
                                                          • Instruction ID: 40726c38ef8819e61b32013846eb22f583c60654fabf7037ca03d33f8eea346c
                                                          • Opcode Fuzzy Hash: 5cd08b1563c148fd53f4d0e7b7a8c5211d132cddc9e3fa82e970d7ecf8881b6b
                                                          • Instruction Fuzzy Hash: F1025871900218EFDB24DF64DD89EAE7BB9FF48710F048158F915AB2A1CB74AD51CB60
                                                          APIs
                                                          • SetTextColor.GDI32(?,00000000), ref: 0082712F
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00827160
                                                          • GetSysColor.USER32(0000000F), ref: 0082716C
                                                          • SetBkColor.GDI32(?,000000FF), ref: 00827186
                                                          • SelectObject.GDI32(?,?), ref: 00827195
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 008271C0
                                                          • GetSysColor.USER32(00000010), ref: 008271C8
                                                          • CreateSolidBrush.GDI32(00000000), ref: 008271CF
                                                          • FrameRect.USER32(?,?,00000000), ref: 008271DE
                                                          • DeleteObject.GDI32(00000000), ref: 008271E5
                                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 00827230
                                                          • FillRect.USER32(?,?,?), ref: 00827262
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00827284
                                                            • Part of subcall function 008273E8: GetSysColor.USER32(00000012), ref: 00827421
                                                            • Part of subcall function 008273E8: SetTextColor.GDI32(?,?), ref: 00827425
                                                            • Part of subcall function 008273E8: GetSysColorBrush.USER32(0000000F), ref: 0082743B
                                                            • Part of subcall function 008273E8: GetSysColor.USER32(0000000F), ref: 00827446
                                                            • Part of subcall function 008273E8: GetSysColor.USER32(00000011), ref: 00827463
                                                            • Part of subcall function 008273E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00827471
                                                            • Part of subcall function 008273E8: SelectObject.GDI32(?,00000000), ref: 00827482
                                                            • Part of subcall function 008273E8: SetBkColor.GDI32(?,00000000), ref: 0082748B
                                                            • Part of subcall function 008273E8: SelectObject.GDI32(?,?), ref: 00827498
                                                            • Part of subcall function 008273E8: InflateRect.USER32(?,000000FF,000000FF), ref: 008274B7
                                                            • Part of subcall function 008273E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008274CE
                                                            • Part of subcall function 008273E8: GetWindowLongW.USER32(00000000,000000F0), ref: 008274DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                          • String ID:
                                                          • API String ID: 4124339563-0
                                                          • Opcode ID: c91fbf96eb677bc0064fca29202a52ff53921c5b1edc0195ada0167093baa0f3
                                                          • Instruction ID: efc8f9389f1a49955b8a1d58b8d6ba25f651557c7fed1fbb0c7e3d619a124442
                                                          • Opcode Fuzzy Hash: c91fbf96eb677bc0064fca29202a52ff53921c5b1edc0195ada0167093baa0f3
                                                          • Instruction Fuzzy Hash: F3A1AE72008311EFDB209F61DC49A6F7BA9FF89320F104A19F962D61E1D774E945CB92
                                                          APIs
                                                          • DestroyWindow.USER32(?,?), ref: 007A8E14
                                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 007E6AC5
                                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 007E6AFE
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 007E6F43
                                                            • Part of subcall function 007A8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,007A8BE8,?,00000000,?,?,?,?,007A8BBA,00000000,?), ref: 007A8FC5
                                                          • SendMessageW.USER32(?,00001053), ref: 007E6F7F
                                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 007E6F96
                                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 007E6FAC
                                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 007E6FB7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                          • String ID: 0
                                                          • API String ID: 2760611726-4108050209
                                                          • Opcode ID: edf38948b86b4f7f40d69c979cb0a296acf907cd8f36ee3461a3d0ccb9849b7a
                                                          • Instruction ID: a7d8e33c8a9b13272e37dfb0be76833e3326fcec1774a8ba315659746f3d6a94
                                                          • Opcode Fuzzy Hash: edf38948b86b4f7f40d69c979cb0a296acf907cd8f36ee3461a3d0ccb9849b7a
                                                          • Instruction Fuzzy Hash: E312B030206241DFDB65CF25C848BA9BBE1FB69340F588569F545CB262CB39EC52CF52
                                                          APIs
                                                          • DestroyWindow.USER32(00000000), ref: 0081273E
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0081286A
                                                          • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 008128A9
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 008128B9
                                                          • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00812900
                                                          • GetClientRect.USER32(00000000,?), ref: 0081290C
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00812955
                                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00812964
                                                          • GetStockObject.GDI32(00000011), ref: 00812974
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00812978
                                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00812988
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00812991
                                                          • DeleteDC.GDI32(00000000), ref: 0081299A
                                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 008129C6
                                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 008129DD
                                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00812A1D
                                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00812A31
                                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 00812A42
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00812A77
                                                          • GetStockObject.GDI32(00000011), ref: 00812A82
                                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00812A8D
                                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00812A97
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                          • API String ID: 2910397461-517079104
                                                          • Opcode ID: b4b4ec2d1717230e08b2bd61559cc710dd88aa6d21a7fa04b022c5e175b477e4
                                                          • Instruction ID: d91a4a98165dd2f279b074ef8f86646d399dda04647d875c6fa4b757e0875dfe
                                                          • Opcode Fuzzy Hash: b4b4ec2d1717230e08b2bd61559cc710dd88aa6d21a7fa04b022c5e175b477e4
                                                          • Instruction Fuzzy Hash: 3EB17B71A00219AFEB24DF68DD4AEAE7BA9FF08710F008114FA15E7291D774ED50CB94
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00804AED
                                                          • GetDriveTypeW.KERNEL32(?,0082CB68,?,\\.\,0082CC08), ref: 00804BCA
                                                          • SetErrorMode.KERNEL32(00000000,0082CB68,?,\\.\,0082CC08), ref: 00804D36
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DriveType
                                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                          • API String ID: 2907320926-4222207086
                                                          • Opcode ID: 14c6c26b038800a519fae89d0ff6887ddfb7aeeecbf182ac419b8b8f44df8880
                                                          • Instruction ID: 8c98d2d3bacbf36325ea7e370d7aaedc803c0ac8a650b0d23aae8c353e054fbd
                                                          • Opcode Fuzzy Hash: 14c6c26b038800a519fae89d0ff6887ddfb7aeeecbf182ac419b8b8f44df8880
                                                          • Instruction Fuzzy Hash: B561EEB028110AEBDBA4DB24CE8297877B0FB04305B649415FE06EB2D1EB3AED55DB41
                                                          APIs
                                                          • GetSysColor.USER32(00000012), ref: 00827421
                                                          • SetTextColor.GDI32(?,?), ref: 00827425
                                                          • GetSysColorBrush.USER32(0000000F), ref: 0082743B
                                                          • GetSysColor.USER32(0000000F), ref: 00827446
                                                          • CreateSolidBrush.GDI32(?), ref: 0082744B
                                                          • GetSysColor.USER32(00000011), ref: 00827463
                                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00827471
                                                          • SelectObject.GDI32(?,00000000), ref: 00827482
                                                          • SetBkColor.GDI32(?,00000000), ref: 0082748B
                                                          • SelectObject.GDI32(?,?), ref: 00827498
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 008274B7
                                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008274CE
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 008274DB
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0082752A
                                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00827554
                                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 00827572
                                                          • DrawFocusRect.USER32(?,?), ref: 0082757D
                                                          • GetSysColor.USER32(00000011), ref: 0082758E
                                                          • SetTextColor.GDI32(?,00000000), ref: 00827596
                                                          • DrawTextW.USER32(?,008270F5,000000FF,?,00000000), ref: 008275A8
                                                          • SelectObject.GDI32(?,?), ref: 008275BF
                                                          • DeleteObject.GDI32(?), ref: 008275CA
                                                          • SelectObject.GDI32(?,?), ref: 008275D0
                                                          • DeleteObject.GDI32(?), ref: 008275D5
                                                          • SetTextColor.GDI32(?,?), ref: 008275DB
                                                          • SetBkColor.GDI32(?,?), ref: 008275E5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 1996641542-0
                                                          • Opcode ID: 68be2b1f68807b51712494ac3e4e82bdbbb9213957c23650f8af1ede7ccb441d
                                                          • Instruction ID: bd3bfc4ce18ef433bbebce3adce7eea7005a960ea5226d0d9b2bb93a945ef838
                                                          • Opcode Fuzzy Hash: 68be2b1f68807b51712494ac3e4e82bdbbb9213957c23650f8af1ede7ccb441d
                                                          • Instruction Fuzzy Hash: 7C616F72904218AFDF119FA4DC49EAEBFB9FF08320F118115F915AB2A1D7749941DF90
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00821128
                                                          • GetDesktopWindow.USER32 ref: 0082113D
                                                          • GetWindowRect.USER32(00000000), ref: 00821144
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00821199
                                                          • DestroyWindow.USER32(?), ref: 008211B9
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 008211ED
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0082120B
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0082121D
                                                          • SendMessageW.USER32(00000000,00000421,?,?), ref: 00821232
                                                          • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00821245
                                                          • IsWindowVisible.USER32(00000000), ref: 008212A1
                                                          • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 008212BC
                                                          • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 008212D0
                                                          • GetWindowRect.USER32(00000000,?), ref: 008212E8
                                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 0082130E
                                                          • GetMonitorInfoW.USER32(00000000,?), ref: 00821328
                                                          • CopyRect.USER32(?,?), ref: 0082133F
                                                          • SendMessageW.USER32(00000000,00000412,00000000), ref: 008213AA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                          • String ID: ($0$tooltips_class32
                                                          • API String ID: 698492251-4156429822
                                                          • Opcode ID: b22ba427496e1bd879ede881a6cb08744a73f6c723e3576042821b93cbf6fa67
                                                          • Instruction ID: ec3674ef39f87b4ca5fde797a60ab518ea3f2b2751faa928fc285c1c9e63e8eb
                                                          • Opcode Fuzzy Hash: b22ba427496e1bd879ede881a6cb08744a73f6c723e3576042821b93cbf6fa67
                                                          • Instruction Fuzzy Hash: AAB18971604350EFDB10DF64E888A6ABBE5FF98340F10891CF999DB261C735E885CB92
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 008202E5
                                                          • _wcslen.LIBCMT ref: 0082031F
                                                          • _wcslen.LIBCMT ref: 00820389
                                                          • _wcslen.LIBCMT ref: 008203F1
                                                          • _wcslen.LIBCMT ref: 00820475
                                                          • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 008204C5
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00820504
                                                            • Part of subcall function 007AF9F2: _wcslen.LIBCMT ref: 007AF9FD
                                                            • Part of subcall function 007F223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 007F2258
                                                            • Part of subcall function 007F223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 007F228A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                                          • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                          • API String ID: 1103490817-719923060
                                                          • Opcode ID: 39550d434ca3b935465b117b4e19904f7b73831bd0ef7115c0434c600389513b
                                                          • Instruction ID: ec33a9a94d4e8b0c7c1f3fb2b4d0181be78aab717581943a8fb5710ccda59864
                                                          • Opcode Fuzzy Hash: 39550d434ca3b935465b117b4e19904f7b73831bd0ef7115c0434c600389513b
                                                          • Instruction Fuzzy Hash: 87E19D31208215DBCB14DF24E55582AB3E6FF98318B14895DF896EB3A2DB34ED85CB81
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007A8968
                                                          • GetSystemMetrics.USER32(00000007), ref: 007A8970
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007A899B
                                                          • GetSystemMetrics.USER32(00000008), ref: 007A89A3
                                                          • GetSystemMetrics.USER32(00000004), ref: 007A89C8
                                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 007A89E5
                                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 007A89F5
                                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 007A8A28
                                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 007A8A3C
                                                          • GetClientRect.USER32(00000000,000000FF), ref: 007A8A5A
                                                          • GetStockObject.GDI32(00000011), ref: 007A8A76
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 007A8A81
                                                            • Part of subcall function 007A912D: GetCursorPos.USER32(?), ref: 007A9141
                                                            • Part of subcall function 007A912D: ScreenToClient.USER32(00000000,?), ref: 007A915E
                                                            • Part of subcall function 007A912D: GetAsyncKeyState.USER32(00000001), ref: 007A9183
                                                            • Part of subcall function 007A912D: GetAsyncKeyState.USER32(00000002), ref: 007A919D
                                                          • SetTimer.USER32(00000000,00000000,00000028,007A90FC), ref: 007A8AA8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                          • String ID: AutoIt v3 GUI
                                                          • API String ID: 1458621304-248962490
                                                          • Opcode ID: 3221b45258677e39feebc739576f271668ec0beef2dca036a921eaca3a186008
                                                          • Instruction ID: 5733f870c1ea37d9d53139212c2df07dc91ebd632b0752fe4b737fd73936a9f0
                                                          • Opcode Fuzzy Hash: 3221b45258677e39feebc739576f271668ec0beef2dca036a921eaca3a186008
                                                          • Instruction Fuzzy Hash: 1EB16771A002099FDF24DFA8CD49BAE7BA5FB48314F158229FA15E7290DB78E841CB51
                                                          APIs
                                                            • Part of subcall function 007F10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007F1114
                                                            • Part of subcall function 007F10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1120
                                                            • Part of subcall function 007F10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F112F
                                                            • Part of subcall function 007F10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1136
                                                            • Part of subcall function 007F10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007F114D
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 007F0DF5
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 007F0E29
                                                          • GetLengthSid.ADVAPI32(?), ref: 007F0E40
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 007F0E7A
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007F0E96
                                                          • GetLengthSid.ADVAPI32(?), ref: 007F0EAD
                                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 007F0EB5
                                                          • HeapAlloc.KERNEL32(00000000), ref: 007F0EBC
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 007F0EDD
                                                          • CopySid.ADVAPI32(00000000), ref: 007F0EE4
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 007F0F13
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007F0F35
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007F0F47
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0F6E
                                                          • HeapFree.KERNEL32(00000000), ref: 007F0F75
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0F7E
                                                          • HeapFree.KERNEL32(00000000), ref: 007F0F85
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0F8E
                                                          • HeapFree.KERNEL32(00000000), ref: 007F0F95
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 007F0FA1
                                                          • HeapFree.KERNEL32(00000000), ref: 007F0FA8
                                                            • Part of subcall function 007F1193: GetProcessHeap.KERNEL32(00000008,007F0BB1,?,00000000,?,007F0BB1,?), ref: 007F11A1
                                                            • Part of subcall function 007F1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,007F0BB1,?), ref: 007F11A8
                                                            • Part of subcall function 007F1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,007F0BB1,?), ref: 007F11B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                          • String ID:
                                                          • API String ID: 4175595110-0
                                                          • Opcode ID: 4d1129d58bf368e9f150b5d42ba1676fa61206064db65cc44db675672a49fe68
                                                          • Instruction ID: deba33db624cda877c14a548fcc09d6170fe1452e487c8f6d2956bff394a85f2
                                                          • Opcode Fuzzy Hash: 4d1129d58bf368e9f150b5d42ba1676fa61206064db65cc44db675672a49fe68
                                                          • Instruction Fuzzy Hash: 5F714F7190020AEBDF209FA4DC49FBEBBB8BF04310F148115FA19A6352D7759A15CBA0
                                                          APIs
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0081C4BD
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,0082CC08,00000000,?,00000000,?,?), ref: 0081C544
                                                          • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0081C5A4
                                                          • _wcslen.LIBCMT ref: 0081C5F4
                                                          • _wcslen.LIBCMT ref: 0081C66F
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0081C6B2
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0081C7C1
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0081C84D
                                                          • RegCloseKey.ADVAPI32(?), ref: 0081C881
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 0081C88E
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0081C960
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                          • API String ID: 9721498-966354055
                                                          • Opcode ID: 0f2183fd0942fcdfef6b96e1bd82080b40687205e2a30ca6abb37f331e735843
                                                          • Instruction ID: 434f3b16bdd54d061d7bac9036be9f70de0476387fc9a51ecedbe5c16e552ad2
                                                          • Opcode Fuzzy Hash: 0f2183fd0942fcdfef6b96e1bd82080b40687205e2a30ca6abb37f331e735843
                                                          • Instruction Fuzzy Hash: 69126835608201DFDB14DF24D885A6AB7E9FF88714F05885CF89A9B3A2DB35ED41CB81
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 008209C6
                                                          • _wcslen.LIBCMT ref: 00820A01
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00820A54
                                                          • _wcslen.LIBCMT ref: 00820A8A
                                                          • _wcslen.LIBCMT ref: 00820B06
                                                          • _wcslen.LIBCMT ref: 00820B81
                                                            • Part of subcall function 007AF9F2: _wcslen.LIBCMT ref: 007AF9FD
                                                            • Part of subcall function 007F2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007F2BFA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                          • API String ID: 1103490817-4258414348
                                                          • Opcode ID: 44074d0768ee94944391d0e822600157d67f17d044958be0b05176f02a8e8642
                                                          • Instruction ID: 8ae43ea0a0d4ebaea5cdd553971ac29ddaf9d9f2415634221645e46a8a80ac16
                                                          • Opcode Fuzzy Hash: 44074d0768ee94944391d0e822600157d67f17d044958be0b05176f02a8e8642
                                                          • Instruction Fuzzy Hash: D2E16A32208321DFCB14DF24D45092AB7E2FF98318B558A5DF8969B362D735ED89CB81
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                          • API String ID: 1256254125-909552448
                                                          • Opcode ID: ac088f5333aab3a5c0ed15537e2b3a23f7048a2d54e1cf4aa84a96cfe2fe3367
                                                          • Instruction ID: 594931b0f206e970918ddfe47936ab2763dc716a22efd50d71aedfb8ceb2145a
                                                          • Opcode Fuzzy Hash: ac088f5333aab3a5c0ed15537e2b3a23f7048a2d54e1cf4aa84a96cfe2fe3367
                                                          • Instruction Fuzzy Hash: 9C71F37268412A8BCB20DE6CD9416FF3399FFA1764B254128FC66D7284E635DDC8C3A0
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 0082835A
                                                          • _wcslen.LIBCMT ref: 0082836E
                                                          • _wcslen.LIBCMT ref: 00828391
                                                          • _wcslen.LIBCMT ref: 008283B4
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 008283F2
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00825BF2), ref: 0082844E
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00828487
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 008284CA
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00828501
                                                          • FreeLibrary.KERNEL32(?), ref: 0082850D
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0082851D
                                                          • DestroyIcon.USER32(?,?,?,?,?,00825BF2), ref: 0082852C
                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00828549
                                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00828555
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                          • String ID: .dll$.exe$.icl
                                                          • API String ID: 799131459-1154884017
                                                          • Opcode ID: 6112bb6e4ed6673744854affc4da53c04343ce0d2ccb841e3dae94ec91ffee4e
                                                          • Instruction ID: 439021fd78480377417c5ff7736219d6ad8338b6d08477ccdbc59b5bb3b9081c
                                                          • Opcode Fuzzy Hash: 6112bb6e4ed6673744854affc4da53c04343ce0d2ccb841e3dae94ec91ffee4e
                                                          • Instruction Fuzzy Hash: 05619E71500629FAEF24DF64EC45BBE77A8FF08B11F108509F815E61D1DB74AA91CBA0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                          • API String ID: 0-1645009161
                                                          • Opcode ID: bf2dba80ee163126dae66cbe257e2a3d71f8266e6efe0deb333bb7fd4ff44efb
                                                          • Instruction ID: 00a2e6790f4a8dfe976cb40be8217dabb66bdb072d0e8ef1b0b63ce68f17261b
                                                          • Opcode Fuzzy Hash: bf2dba80ee163126dae66cbe257e2a3d71f8266e6efe0deb333bb7fd4ff44efb
                                                          • Instruction Fuzzy Hash: 1B81FF71614605FBDF28AFA0EC46FAE37B9BF15300F044025F914AA292EB7DDA51C6A1
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?), ref: 00803EF8
                                                          • _wcslen.LIBCMT ref: 00803F03
                                                          • _wcslen.LIBCMT ref: 00803F5A
                                                          • _wcslen.LIBCMT ref: 00803F98
                                                          • GetDriveTypeW.KERNEL32(?), ref: 00803FD6
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0080401E
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00804059
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00804087
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                          • API String ID: 1839972693-4113822522
                                                          • Opcode ID: 8e660d1ada978a23e48fbaaf29143875e8ad8edbc720d5d03f86a8d9509cb854
                                                          • Instruction ID: 2bd18acbe70952d7ba9fc189324d812493a28586e7b958e8e465a3a8ef5eb1ff
                                                          • Opcode Fuzzy Hash: 8e660d1ada978a23e48fbaaf29143875e8ad8edbc720d5d03f86a8d9509cb854
                                                          • Instruction Fuzzy Hash: CB71D0726042029FC750EF24C88086AB7F4FF94768F504A2DF995D7291EB35ED49CB91
                                                          APIs
                                                          • LoadIconW.USER32(00000063), ref: 007F5A2E
                                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 007F5A40
                                                          • SetWindowTextW.USER32(?,?), ref: 007F5A57
                                                          • GetDlgItem.USER32(?,000003EA), ref: 007F5A6C
                                                          • SetWindowTextW.USER32(00000000,?), ref: 007F5A72
                                                          • GetDlgItem.USER32(?,000003E9), ref: 007F5A82
                                                          • SetWindowTextW.USER32(00000000,?), ref: 007F5A88
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 007F5AA9
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 007F5AC3
                                                          • GetWindowRect.USER32(?,?), ref: 007F5ACC
                                                          • _wcslen.LIBCMT ref: 007F5B33
                                                          • SetWindowTextW.USER32(?,?), ref: 007F5B6F
                                                          • GetDesktopWindow.USER32 ref: 007F5B75
                                                          • GetWindowRect.USER32(00000000), ref: 007F5B7C
                                                          • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 007F5BD3
                                                          • GetClientRect.USER32(?,?), ref: 007F5BE0
                                                          • PostMessageW.USER32(?,00000005,00000000,?), ref: 007F5C05
                                                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 007F5C2F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                          • String ID:
                                                          • API String ID: 895679908-0
                                                          • Opcode ID: f2fa7f91ea938f3ef23e02f076d6ccde0dc1c505dcc06249df2d944e16b1dc4c
                                                          • Instruction ID: 5dde087c220daeefb9297f2d7072f33f2578c03c59e01f9456e85cfadf558bf0
                                                          • Opcode Fuzzy Hash: f2fa7f91ea938f3ef23e02f076d6ccde0dc1c505dcc06249df2d944e16b1dc4c
                                                          • Instruction Fuzzy Hash: C6715E71900B09EFDB20DFA8CE89A7EBBF5FF48704F104519E642A26A0D779E945CB50
                                                          APIs
                                                          • LoadCursorW.USER32(00000000,00007F89), ref: 0080FE27
                                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 0080FE32
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 0080FE3D
                                                          • LoadCursorW.USER32(00000000,00007F03), ref: 0080FE48
                                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 0080FE53
                                                          • LoadCursorW.USER32(00000000,00007F01), ref: 0080FE5E
                                                          • LoadCursorW.USER32(00000000,00007F81), ref: 0080FE69
                                                          • LoadCursorW.USER32(00000000,00007F88), ref: 0080FE74
                                                          • LoadCursorW.USER32(00000000,00007F80), ref: 0080FE7F
                                                          • LoadCursorW.USER32(00000000,00007F86), ref: 0080FE8A
                                                          • LoadCursorW.USER32(00000000,00007F83), ref: 0080FE95
                                                          • LoadCursorW.USER32(00000000,00007F85), ref: 0080FEA0
                                                          • LoadCursorW.USER32(00000000,00007F82), ref: 0080FEAB
                                                          • LoadCursorW.USER32(00000000,00007F84), ref: 0080FEB6
                                                          • LoadCursorW.USER32(00000000,00007F04), ref: 0080FEC1
                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 0080FECC
                                                          • GetCursorInfo.USER32(?), ref: 0080FEDC
                                                          • GetLastError.KERNEL32 ref: 0080FF1E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Cursor$Load$ErrorInfoLast
                                                          • String ID:
                                                          • API String ID: 3215588206-0
                                                          • Opcode ID: 691ae4a0dc4f3d5fdd67b843ab26d01416e802d1befbc1945c68ccb4824d4572
                                                          • Instruction ID: 198e6bc944b30feb5f9f54974b6ef8ce37ad2ca9feb30931b62cbe9db2de02ac
                                                          • Opcode Fuzzy Hash: 691ae4a0dc4f3d5fdd67b843ab26d01416e802d1befbc1945c68ccb4824d4572
                                                          • Instruction Fuzzy Hash: 064168B0D043196ADB60DF768C8985EBFE8FF04754B50852AF11DE7681DB789901CF91
                                                          APIs
                                                          • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 007B00C6
                                                            • Part of subcall function 007B00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0086070C,00000FA0,5F78CC7D,?,?,?,?,007D23B3,000000FF), ref: 007B011C
                                                            • Part of subcall function 007B00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,007D23B3,000000FF), ref: 007B0127
                                                            • Part of subcall function 007B00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,007D23B3,000000FF), ref: 007B0138
                                                            • Part of subcall function 007B00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 007B014E
                                                            • Part of subcall function 007B00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 007B015C
                                                            • Part of subcall function 007B00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 007B016A
                                                            • Part of subcall function 007B00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 007B0195
                                                            • Part of subcall function 007B00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 007B01A0
                                                          • ___scrt_fastfail.LIBCMT ref: 007B00E7
                                                            • Part of subcall function 007B00A3: __onexit.LIBCMT ref: 007B00A9
                                                          Strings
                                                          • api-ms-win-core-synch-l1-2-0.dll, xrefs: 007B0122
                                                          • WakeAllConditionVariable, xrefs: 007B0162
                                                          • InitializeConditionVariable, xrefs: 007B0148
                                                          • SleepConditionVariableCS, xrefs: 007B0154
                                                          • kernel32.dll, xrefs: 007B0133
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                          • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                          • API String ID: 66158676-1714406822
                                                          • Opcode ID: fe55e69d94d879e1dd7c2809332f00eb16d899d1b034b8385daaf438fcaea31f
                                                          • Instruction ID: bc20af31da7cb3a645cf387c5314d5bc3eb69a6d135ab3dc9ccc3b9687990ff8
                                                          • Opcode Fuzzy Hash: fe55e69d94d879e1dd7c2809332f00eb16d899d1b034b8385daaf438fcaea31f
                                                          • Instruction Fuzzy Hash: FF21FC72644718ABD7245BA4AC0ABAF77E4FB45B51F014535F911E3391DB7C9800CAD4
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                          • API String ID: 176396367-1603158881
                                                          • Opcode ID: 39f72a4e4e654409762d9b3aeccd903f236c19a783df96074ce73f44bd7236be
                                                          • Instruction ID: d7a4b4c4c2fbf84cf07147c49b4fb430c72213f925291a7680713aca9de86738
                                                          • Opcode Fuzzy Hash: 39f72a4e4e654409762d9b3aeccd903f236c19a783df96074ce73f44bd7236be
                                                          • Instruction Fuzzy Hash: B5E1C532A0051AEBCB14DFB8C455BFDBBB0BF54710F548219EA56E7340DB38AE899790
                                                          APIs
                                                          • CharLowerBuffW.USER32(00000000,00000000,0082CC08), ref: 00804527
                                                          • _wcslen.LIBCMT ref: 0080453B
                                                          • _wcslen.LIBCMT ref: 00804599
                                                          • _wcslen.LIBCMT ref: 008045F4
                                                          • _wcslen.LIBCMT ref: 0080463F
                                                          • _wcslen.LIBCMT ref: 008046A7
                                                            • Part of subcall function 007AF9F2: _wcslen.LIBCMT ref: 007AF9FD
                                                          • GetDriveTypeW.KERNEL32(?,00856BF0,00000061), ref: 00804743
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharDriveLowerType
                                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                          • API String ID: 2055661098-1000479233
                                                          • Opcode ID: 10519a2ae1df1ba5563e0bde46823c535456909802b9491bae2aace880bcc178
                                                          • Instruction ID: 97ffdc9563e65ad492af33957a03e6995ae3670c335bf489c7db3d938a99c182
                                                          • Opcode Fuzzy Hash: 10519a2ae1df1ba5563e0bde46823c535456909802b9491bae2aace880bcc178
                                                          • Instruction Fuzzy Hash: 4BB11FB16483029FC750DF28DC90A6AB7E5FFA5720F505A1CF6A6C32D1E734D844CA92
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,0082CC08), ref: 008140BB
                                                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 008140CD
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,0082CC08), ref: 008140F2
                                                          • FreeLibrary.KERNEL32(00000000,?,0082CC08), ref: 0081413E
                                                          • StringFromGUID2.OLE32(?,?,00000028,?,0082CC08), ref: 008141A8
                                                          • SysFreeString.OLEAUT32(00000009), ref: 00814262
                                                          • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 008142C8
                                                          • SysFreeString.OLEAUT32(?), ref: 008142F2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                          • String ID: GetModuleHandleExW$kernel32.dll
                                                          • API String ID: 354098117-199464113
                                                          • Opcode ID: 3bb51c217dfe036ba6b66a7bb37a3fe21ab14f0b7e41b52f4d2c470f276cbb17
                                                          • Instruction ID: 8b5d51da787d9b62f9046059c3c341576e69c0078b8a8629a41e6c544f4bdb55
                                                          • Opcode Fuzzy Hash: 3bb51c217dfe036ba6b66a7bb37a3fe21ab14f0b7e41b52f4d2c470f276cbb17
                                                          • Instruction Fuzzy Hash: 48122B75A00119EFDB14DF94C884EAEB7B9FF49318F248098E905EB251D731ED86CBA0
                                                          APIs
                                                          • GetMenuItemCount.USER32(00861990), ref: 007D2F8D
                                                          • GetMenuItemCount.USER32(00861990), ref: 007D303D
                                                          • GetCursorPos.USER32(?), ref: 007D3081
                                                          • SetForegroundWindow.USER32(00000000), ref: 007D308A
                                                          • TrackPopupMenuEx.USER32(00861990,00000000,?,00000000,00000000,00000000), ref: 007D309D
                                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 007D30A9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                          • String ID: 0
                                                          • API String ID: 36266755-4108050209
                                                          • Opcode ID: 1a53c54bdf5946853897738594fe9bba358da2d5b856df5134239b895e437820
                                                          • Instruction ID: 02c70986d88c7a395dbf2a68e260d3065e9c7be3eac87e15c556e9f4a0ab87ca
                                                          • Opcode Fuzzy Hash: 1a53c54bdf5946853897738594fe9bba358da2d5b856df5134239b895e437820
                                                          • Instruction Fuzzy Hash: F8713831644205BEEB218F24DD49FAEBF75FF05324F204207F524AA2E1C7B9A912CB90
                                                          APIs
                                                          • DestroyWindow.USER32(00000000,?), ref: 00826DEB
                                                            • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00826E5F
                                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00826E81
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00826E94
                                                          • DestroyWindow.USER32(?), ref: 00826EB5
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00790000,00000000), ref: 00826EE4
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00826EFD
                                                          • GetDesktopWindow.USER32 ref: 00826F16
                                                          • GetWindowRect.USER32(00000000), ref: 00826F1D
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00826F35
                                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00826F4D
                                                            • Part of subcall function 007A9944: GetWindowLongW.USER32(?,000000EB), ref: 007A9952
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                          • String ID: 0$tooltips_class32
                                                          • API String ID: 2429346358-3619404913
                                                          • Opcode ID: 8c9ca771c2e680eb46f10629532bb9a982182a74179e8665eaafc9c3abe3b899
                                                          • Instruction ID: f281788b7991f7896b8b3265c647370b20b6a04bebae8b1cd665f1f0450cf583
                                                          • Opcode Fuzzy Hash: 8c9ca771c2e680eb46f10629532bb9a982182a74179e8665eaafc9c3abe3b899
                                                          • Instruction Fuzzy Hash: 7D718774104244AFDB21CF18EC48FBABBE9FB88304F54441DF999D7261EB70A956CB11
                                                          APIs
                                                            • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                          • DragQueryPoint.SHELL32(?,?), ref: 00829147
                                                            • Part of subcall function 00827674: ClientToScreen.USER32(?,?), ref: 0082769A
                                                            • Part of subcall function 00827674: GetWindowRect.USER32(?,?), ref: 00827710
                                                            • Part of subcall function 00827674: PtInRect.USER32(?,?,00828B89), ref: 00827720
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 008291B0
                                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 008291BB
                                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 008291DE
                                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00829225
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 0082923E
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00829255
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00829277
                                                          • DragFinish.SHELL32(?), ref: 0082927E
                                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00829371
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                          • API String ID: 221274066-3440237614
                                                          • Opcode ID: 7a857c3821a67aaf099c75ac3cb4996007577ea8356c81012a276f0a9d529e64
                                                          • Instruction ID: 1e9fb36b658e1efe701474a6e69a5557ce8f71ba6fc23f76b3c8387de6d2f690
                                                          • Opcode Fuzzy Hash: 7a857c3821a67aaf099c75ac3cb4996007577ea8356c81012a276f0a9d529e64
                                                          • Instruction Fuzzy Hash: 7C617C71108301AFD701DF64EC89DAFBBE8FF99350F40491DF695922A1DB349A49CBA2
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0080C4B0
                                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0080C4C3
                                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0080C4D7
                                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0080C4F0
                                                          • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0080C533
                                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0080C549
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0080C554
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0080C584
                                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0080C5DC
                                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0080C5F0
                                                          • InternetCloseHandle.WININET(00000000), ref: 0080C5FB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                          • String ID:
                                                          • API String ID: 3800310941-3916222277
                                                          • Opcode ID: e9add2049420b3297af69510c994b5bf485ccde8ed4cb4709062745779efa488
                                                          • Instruction ID: df2e09b39e59a3e6cf63d3726b01f7d08b11ef9278705539f2ccf1ee09a8402a
                                                          • Opcode Fuzzy Hash: e9add2049420b3297af69510c994b5bf485ccde8ed4cb4709062745779efa488
                                                          • Instruction Fuzzy Hash: 6B514AB5500608BFDB718F64CD88ABB7BBCFF08754F108619F945D6290DB34E9459BA0
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00828592
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008285A2
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008285AD
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008285BA
                                                          • GlobalLock.KERNEL32(00000000), ref: 008285C8
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008285D7
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 008285E0
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008285E7
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008285F8
                                                          • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,0082FC38,?), ref: 00828611
                                                          • GlobalFree.KERNEL32(00000000), ref: 00828621
                                                          • GetObjectW.GDI32(?,00000018,?), ref: 00828641
                                                          • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00828671
                                                          • DeleteObject.GDI32(?), ref: 00828699
                                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 008286AF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                          • String ID:
                                                          • API String ID: 3840717409-0
                                                          • Opcode ID: 44adb319900364b315d367530b2954d5cfcefb65322a5ba2246966c776d98239
                                                          • Instruction ID: 671b0dff41a313f157185d31d543efb55114d433fda2bcec0732fe6ac3c8cf95
                                                          • Opcode Fuzzy Hash: 44adb319900364b315d367530b2954d5cfcefb65322a5ba2246966c776d98239
                                                          • Instruction Fuzzy Hash: 9E411975601218EFDB21DFA5DD48EAE7BB8FF99715F108058F909E7260DB30A942CB60
                                                          APIs
                                                          • VariantInit.OLEAUT32(00000000), ref: 00801502
                                                          • VariantCopy.OLEAUT32(?,?), ref: 0080150B
                                                          • VariantClear.OLEAUT32(?), ref: 00801517
                                                          • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 008015FB
                                                          • VarR8FromDec.OLEAUT32(?,?), ref: 00801657
                                                          • VariantInit.OLEAUT32(?), ref: 00801708
                                                          • SysFreeString.OLEAUT32(?), ref: 0080178C
                                                          • VariantClear.OLEAUT32(?), ref: 008017D8
                                                          • VariantClear.OLEAUT32(?), ref: 008017E7
                                                          • VariantInit.OLEAUT32(00000000), ref: 00801823
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                          • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                          • API String ID: 1234038744-3931177956
                                                          • Opcode ID: 58bd0985ae82f51803397c50034d9d7cd1e345c9ecb03ca10017bb9a293edc83
                                                          • Instruction ID: ad7f24d5db209d6dbf1397f3307f74bda0af65c137ed21b54fc2bdcedeb27412
                                                          • Opcode Fuzzy Hash: 58bd0985ae82f51803397c50034d9d7cd1e345c9ecb03ca10017bb9a293edc83
                                                          • Instruction Fuzzy Hash: 71D1DD32A00619EBDF50AF64EC8EA7DB7B5FF45724F14815AE406EB1C0DB34A841DBA1
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 0081C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0081B6AE,?,?), ref: 0081C9B5
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081C9F1
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA68
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0081B6F4
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0081B772
                                                          • RegDeleteValueW.ADVAPI32(?,?), ref: 0081B80A
                                                          • RegCloseKey.ADVAPI32(?), ref: 0081B87E
                                                          • RegCloseKey.ADVAPI32(?), ref: 0081B89C
                                                          • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0081B8F2
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0081B904
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 0081B922
                                                          • FreeLibrary.KERNEL32(00000000), ref: 0081B983
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 0081B994
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 146587525-4033151799
                                                          • Opcode ID: 2349a5b3e9b81fa236edfecc979666ecd314f8fa6e0f4790c7694654d0c0f4a7
                                                          • Instruction ID: 737e3100edc9977c6fdeebce40ae307fb3036e297e4d5c8a7d3d36e53518ddf0
                                                          • Opcode Fuzzy Hash: 2349a5b3e9b81fa236edfecc979666ecd314f8fa6e0f4790c7694654d0c0f4a7
                                                          • Instruction Fuzzy Hash: 2AC17D31204201EFDB14DF14C495F6ABBE5FF84318F14855CE55A8B2A2DB75EC86CB91
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 008125D8
                                                          • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 008125E8
                                                          • CreateCompatibleDC.GDI32(?), ref: 008125F4
                                                          • SelectObject.GDI32(00000000,?), ref: 00812601
                                                          • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0081266D
                                                          • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 008126AC
                                                          • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 008126D0
                                                          • SelectObject.GDI32(?,?), ref: 008126D8
                                                          • DeleteObject.GDI32(?), ref: 008126E1
                                                          • DeleteDC.GDI32(?), ref: 008126E8
                                                          • ReleaseDC.USER32(00000000,?), ref: 008126F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                          • String ID: (
                                                          • API String ID: 2598888154-3887548279
                                                          • Opcode ID: e91526597d6044bb56b16998da69ff5a12bff2ab5e63495e166f14405c8ee8c6
                                                          • Instruction ID: ed4a05cfda1c9a04da96c477f4b3848e8cd7d302140903ba04ac77bbd232a1b8
                                                          • Opcode Fuzzy Hash: e91526597d6044bb56b16998da69ff5a12bff2ab5e63495e166f14405c8ee8c6
                                                          • Instruction Fuzzy Hash: 1061D275D00219EFCF14CFA8D885AAEBBB9FF48310F208529E955A7250D770A951CF94
                                                          APIs
                                                          • ___free_lconv_mon.LIBCMT ref: 007CDAA1
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD659
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD66B
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD67D
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD68F
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6A1
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6B3
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6C5
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6D7
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6E9
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6FB
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD70D
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD71F
                                                            • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD731
                                                          • _free.LIBCMT ref: 007CDA96
                                                            • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                            • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                          • _free.LIBCMT ref: 007CDAB8
                                                          • _free.LIBCMT ref: 007CDACD
                                                          • _free.LIBCMT ref: 007CDAD8
                                                          • _free.LIBCMT ref: 007CDAFA
                                                          • _free.LIBCMT ref: 007CDB0D
                                                          • _free.LIBCMT ref: 007CDB1B
                                                          • _free.LIBCMT ref: 007CDB26
                                                          • _free.LIBCMT ref: 007CDB5E
                                                          • _free.LIBCMT ref: 007CDB65
                                                          • _free.LIBCMT ref: 007CDB82
                                                          • _free.LIBCMT ref: 007CDB9A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                          • String ID:
                                                          • API String ID: 161543041-0
                                                          • Opcode ID: ed16e98a3343bd41f2e1faaf89de1d676a594af2da8f4e9e841264b53afa2046
                                                          • Instruction ID: 58c84757230f259096f9c1d5ea32653a62fa4655864c432f7d64943a74928fb4
                                                          • Opcode Fuzzy Hash: ed16e98a3343bd41f2e1faaf89de1d676a594af2da8f4e9e841264b53afa2046
                                                          • Instruction Fuzzy Hash: 1D313771604705DFEB31AA79E849F5AB7E9FF00311F15842DE449E71A2DA39BC81CB20
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 007F369C
                                                          • _wcslen.LIBCMT ref: 007F36A7
                                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 007F3797
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 007F380C
                                                          • GetDlgCtrlID.USER32(?), ref: 007F385D
                                                          • GetWindowRect.USER32(?,?), ref: 007F3882
                                                          • GetParent.USER32(?), ref: 007F38A0
                                                          • ScreenToClient.USER32(00000000), ref: 007F38A7
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 007F3921
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 007F395D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                          • String ID: %s%u
                                                          • API String ID: 4010501982-679674701
                                                          • Opcode ID: 1eee2eee9bb3e1b92dbb4562761ccb3afd04a0a869b3cbda0b521afcab51ca1f
                                                          • Instruction ID: 10279f71db097cdafafe08ced29f4aca3fb29342dc931eb2f89b9abbbd199510
                                                          • Opcode Fuzzy Hash: 1eee2eee9bb3e1b92dbb4562761ccb3afd04a0a869b3cbda0b521afcab51ca1f
                                                          • Instruction Fuzzy Hash: 7491B57120460AEFD715DF24C885BFAF7A8FF44354F008619FA99D2250DB78EA45CBA1
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 007F4994
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 007F49DA
                                                          • _wcslen.LIBCMT ref: 007F49EB
                                                          • CharUpperBuffW.USER32(?,00000000), ref: 007F49F7
                                                          • _wcsstr.LIBVCRUNTIME ref: 007F4A2C
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 007F4A64
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 007F4A9D
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 007F4AE6
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 007F4B20
                                                          • GetWindowRect.USER32(?,?), ref: 007F4B8B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                          • String ID: ThumbnailClass
                                                          • API String ID: 1311036022-1241985126
                                                          • Opcode ID: 5edcaa97f8b538c3fa8d3e40c5eae3c193d6b90c54e0cf62440b4c99ca33a81e
                                                          • Instruction ID: adfb6fcb2845df5fa02704e860ce794b7864579af8e5bb80d2b46187105553d4
                                                          • Opcode Fuzzy Hash: 5edcaa97f8b538c3fa8d3e40c5eae3c193d6b90c54e0cf62440b4c99ca33a81e
                                                          • Instruction Fuzzy Hash: 39918C711042099FDB14DF14C985BBB77E8FF84314F048469FE859A296EB38ED45CBA1
                                                          APIs
                                                            • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00828D5A
                                                          • GetFocus.USER32 ref: 00828D6A
                                                          • GetDlgCtrlID.USER32(00000000), ref: 00828D75
                                                          • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00828E1D
                                                          • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00828ECF
                                                          • GetMenuItemCount.USER32(?), ref: 00828EEC
                                                          • GetMenuItemID.USER32(?,00000000), ref: 00828EFC
                                                          • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00828F2E
                                                          • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00828F70
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00828FA1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                          • String ID: 0
                                                          • API String ID: 1026556194-4108050209
                                                          • Opcode ID: f61c5d253861b2fd893234a6d137b5d647ece0b10bb7c0ca231b1e9fd3e4799e
                                                          • Instruction ID: 7e1e7752816ad8be9e5fdcfd4540267a82ce6c4f739f431835e98a0af92880fe
                                                          • Opcode Fuzzy Hash: f61c5d253861b2fd893234a6d137b5d647ece0b10bb7c0ca231b1e9fd3e4799e
                                                          • Instruction Fuzzy Hash: 2E81BF71509321EFDB20CF14E984AAB7BE9FF88314F040919F984D7291DB70D985CBA2
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(00861990,000000FF,00000000,00000030), ref: 007FBFAC
                                                          • SetMenuItemInfoW.USER32(00861990,00000004,00000000,00000030), ref: 007FBFE1
                                                          • Sleep.KERNEL32(000001F4), ref: 007FBFF3
                                                          • GetMenuItemCount.USER32(?), ref: 007FC039
                                                          • GetMenuItemID.USER32(?,00000000), ref: 007FC056
                                                          • GetMenuItemID.USER32(?,-00000001), ref: 007FC082
                                                          • GetMenuItemID.USER32(?,?), ref: 007FC0C9
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 007FC10F
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007FC124
                                                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007FC145
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                          • String ID: 0
                                                          • API String ID: 1460738036-4108050209
                                                          • Opcode ID: 4c70dcbd33fb842efe7b1187dd1b054d0524fe1a108f5f0fc601c6af5e6acd7e
                                                          • Instruction ID: a5892fc5b7b00fc4b64efd56b91c63b33bcc342128703eceab208baca5d62647
                                                          • Opcode Fuzzy Hash: 4c70dcbd33fb842efe7b1187dd1b054d0524fe1a108f5f0fc601c6af5e6acd7e
                                                          • Instruction Fuzzy Hash: 056182B090024DEFDF22CF64CE88ABE7BA8FB05354F144555EA11A7391D739AD15CB60
                                                          APIs
                                                          • GetFileVersionInfoSizeW.VERSION(?,?), ref: 007FDC20
                                                          • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 007FDC46
                                                          • _wcslen.LIBCMT ref: 007FDC50
                                                          • _wcsstr.LIBVCRUNTIME ref: 007FDCA0
                                                          • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 007FDCBC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                          • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                          • API String ID: 1939486746-1459072770
                                                          • Opcode ID: b1c3de09c7de5e463a400bd6510d60f3a1da33203933c488f683e29092f1e760
                                                          • Instruction ID: 44c0b9adb4379581a956db3f8cd2b5811d63116b51d307f481dfc11d9f0a302f
                                                          • Opcode Fuzzy Hash: b1c3de09c7de5e463a400bd6510d60f3a1da33203933c488f683e29092f1e760
                                                          • Instruction Fuzzy Hash: 0F412A72644205BADB24A7749C4BFFF776CEF56710F10016AFA00E6282EB7C9D0196A4
                                                          APIs
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0081CC64
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0081CC8D
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0081CD48
                                                            • Part of subcall function 0081CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0081CCAA
                                                            • Part of subcall function 0081CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0081CCBD
                                                            • Part of subcall function 0081CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0081CCCF
                                                            • Part of subcall function 0081CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0081CD05
                                                            • Part of subcall function 0081CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0081CD28
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 0081CCF3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 2734957052-4033151799
                                                          • Opcode ID: 8ebcb6e245dbf5d4b73d0579d0403ae895eaa6c30c010a01030b6633563d9f42
                                                          • Instruction ID: d6388a366479813e1de374e0a6d620a47c2895ef81f932771f28ce3d12a0d4f1
                                                          • Opcode Fuzzy Hash: 8ebcb6e245dbf5d4b73d0579d0403ae895eaa6c30c010a01030b6633563d9f42
                                                          • Instruction Fuzzy Hash: CC316C71941129BBDB308B55EC88EFFBB7CFF55750F004165A906E2240DA749E86DAE0
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00803D40
                                                          • _wcslen.LIBCMT ref: 00803D6D
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00803D9D
                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00803DBE
                                                          • RemoveDirectoryW.KERNEL32(?), ref: 00803DCE
                                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00803E55
                                                          • CloseHandle.KERNEL32(00000000), ref: 00803E60
                                                          • CloseHandle.KERNEL32(00000000), ref: 00803E6B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                          • String ID: :$\$\??\%s
                                                          • API String ID: 1149970189-3457252023
                                                          • Opcode ID: 88140d5037a744302ecee1a98181644c391bf612ba6c6e2cd85524041f69b167
                                                          • Instruction ID: 596c0f9f68e50f9ce3af321ccccbe38eebfdca983929f62f1cc03331426297dc
                                                          • Opcode Fuzzy Hash: 88140d5037a744302ecee1a98181644c391bf612ba6c6e2cd85524041f69b167
                                                          • Instruction Fuzzy Hash: 6E318171900209ABDB219BA0DC49FEF77BCFF89740F1041A6F915D61A0EB7497458B24
                                                          APIs
                                                          • timeGetTime.WINMM ref: 007FE6B4
                                                            • Part of subcall function 007AE551: timeGetTime.WINMM(?,?,007FE6D4), ref: 007AE555
                                                          • Sleep.KERNEL32(0000000A), ref: 007FE6E1
                                                          • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 007FE705
                                                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 007FE727
                                                          • SetActiveWindow.USER32 ref: 007FE746
                                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 007FE754
                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 007FE773
                                                          • Sleep.KERNEL32(000000FA), ref: 007FE77E
                                                          • IsWindow.USER32 ref: 007FE78A
                                                          • EndDialog.USER32(00000000), ref: 007FE79B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                          • String ID: BUTTON
                                                          • API String ID: 1194449130-3405671355
                                                          • Opcode ID: 125f5571201b93628f400f48c5e1167a2f9fa06cc8c3ef04ff57c986300cc855
                                                          • Instruction ID: a1d0c44a567786e306272527ba064686cd3bd01d76c9b405a361067d2099f0a2
                                                          • Opcode Fuzzy Hash: 125f5571201b93628f400f48c5e1167a2f9fa06cc8c3ef04ff57c986300cc855
                                                          • Instruction Fuzzy Hash: 7D21A8B0200608EFEB10AFA4ED8DA393B69F764749F115425F612C13B1DBB99C119B24
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 007FEA5D
                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 007FEA73
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007FEA84
                                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 007FEA96
                                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 007FEAA7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: SendString$_wcslen
                                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                          • API String ID: 2420728520-1007645807
                                                          • Opcode ID: 546af0eec14588e5aa794bea84868d233c41d3246522fe3e88d64ab4ee879191
                                                          • Instruction ID: 2b5d675d2e38caf526063573cb4abb6f41d140578bca63fac57e00315dd97a4b
                                                          • Opcode Fuzzy Hash: 546af0eec14588e5aa794bea84868d233c41d3246522fe3e88d64ab4ee879191
                                                          • Instruction Fuzzy Hash: E8119131A90219B9EB20A7A5EC4ADFF6A7CFBD1F00F4044297911E31E0FE781919C5B0
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 007FA012
                                                          • SetKeyboardState.USER32(?), ref: 007FA07D
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 007FA09D
                                                          • GetKeyState.USER32(000000A0), ref: 007FA0B4
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 007FA0E3
                                                          • GetKeyState.USER32(000000A1), ref: 007FA0F4
                                                          • GetAsyncKeyState.USER32(00000011), ref: 007FA120
                                                          • GetKeyState.USER32(00000011), ref: 007FA12E
                                                          • GetAsyncKeyState.USER32(00000012), ref: 007FA157
                                                          • GetKeyState.USER32(00000012), ref: 007FA165
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 007FA18E
                                                          • GetKeyState.USER32(0000005B), ref: 007FA19C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 5adf4abc0fe0bfc15772ee801bcbdaf6e1176955cecd067c4932c9b028711561
                                                          • Instruction ID: 658c0e65ea2b51045162d72eecac906b3a104506a8ce19a714be17ea8cb5453c
                                                          • Opcode Fuzzy Hash: 5adf4abc0fe0bfc15772ee801bcbdaf6e1176955cecd067c4932c9b028711561
                                                          • Instruction Fuzzy Hash: 3651986090478C79FB35DB608815BFAAFF59F12380F088599D7C6573C2EA58AA4CC762
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000001), ref: 007F5CE2
                                                          • GetWindowRect.USER32(00000000,?), ref: 007F5CFB
                                                          • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 007F5D59
                                                          • GetDlgItem.USER32(?,00000002), ref: 007F5D69
                                                          • GetWindowRect.USER32(00000000,?), ref: 007F5D7B
                                                          • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 007F5DCF
                                                          • GetDlgItem.USER32(?,000003E9), ref: 007F5DDD
                                                          • GetWindowRect.USER32(00000000,?), ref: 007F5DEF
                                                          • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 007F5E31
                                                          • GetDlgItem.USER32(?,000003EA), ref: 007F5E44
                                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 007F5E5A
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 007F5E67
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMoveRect$Invalidate
                                                          • String ID:
                                                          • API String ID: 3096461208-0
                                                          • Opcode ID: 2700a6749d6b2ec81c25c0883a0fcd9e52bde4bc46a57a3631ba9a5ff09a6582
                                                          • Instruction ID: df086a5b86fa7af2e91444132192f0b30a68963cbb4924b11cab7cd7a4ec1313
                                                          • Opcode Fuzzy Hash: 2700a6749d6b2ec81c25c0883a0fcd9e52bde4bc46a57a3631ba9a5ff09a6582
                                                          • Instruction Fuzzy Hash: 7D51FD71B00609AFDB18CF68DD89ABEBBB5FB58310F148229FA15E6290D7749E05CB50
                                                          APIs
                                                            • Part of subcall function 007A8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,007A8BE8,?,00000000,?,?,?,?,007A8BBA,00000000,?), ref: 007A8FC5
                                                          • DestroyWindow.USER32(?), ref: 007A8C81
                                                          • KillTimer.USER32(00000000,?,?,?,?,007A8BBA,00000000,?), ref: 007A8D1B
                                                          • DestroyAcceleratorTable.USER32(00000000), ref: 007E6973
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,007A8BBA,00000000,?), ref: 007E69A1
                                                          • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,007A8BBA,00000000,?), ref: 007E69B8
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,007A8BBA,00000000), ref: 007E69D4
                                                          • DeleteObject.GDI32(00000000), ref: 007E69E6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                          • String ID:
                                                          • API String ID: 641708696-0
                                                          • Opcode ID: f38b22da0be23c3bf483515e7d2479b86d1525d24a91c7760745d200095bf0d9
                                                          • Instruction ID: 5593044dc355e06bed2a3a1c0baa2acda0dc3567fe9ce8c07ac6217d61912cb6
                                                          • Opcode Fuzzy Hash: f38b22da0be23c3bf483515e7d2479b86d1525d24a91c7760745d200095bf0d9
                                                          • Instruction Fuzzy Hash: 5E61CF30502640DFCB759F15C948B39BBF1FB95322F14966CE04297661CB79AC91CF62
                                                          APIs
                                                            • Part of subcall function 007A9944: GetWindowLongW.USER32(?,000000EB), ref: 007A9952
                                                          • GetSysColor.USER32(0000000F), ref: 007A9862
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ColorLongWindow
                                                          • String ID:
                                                          • API String ID: 259745315-0
                                                          • Opcode ID: e2d7e473d23b226b1e29d22d2f801807a2d54e2a323ad903b838bf3d7374955b
                                                          • Instruction ID: 0a54125820bb350b53c13f0be5c1a7767eece7db74611fd66ed35570c21e2458
                                                          • Opcode Fuzzy Hash: e2d7e473d23b226b1e29d22d2f801807a2d54e2a323ad903b838bf3d7374955b
                                                          • Instruction Fuzzy Hash: FF418F31105640AFDB305F389C89BB93B65BB87321F148715FAA2871E1D77D9C62DB10
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: .{
                                                          • API String ID: 0-1852962426
                                                          • Opcode ID: 88f34367101e602962bd7045aca13168caf853b508bd7b07515a588cad06cff4
                                                          • Instruction ID: 0f5b7d358a80d577511591812af26291292ecbb365acb0f1d209004dc265aaad
                                                          • Opcode Fuzzy Hash: 88f34367101e602962bd7045aca13168caf853b508bd7b07515a588cad06cff4
                                                          • Instruction Fuzzy Hash: 96C1E47590424AEFDB51DFA8D849FEDBBB0BF09310F04409DE915AB392CB789981CB61
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,007DF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 007F9717
                                                          • LoadStringW.USER32(00000000,?,007DF7F8,00000001), ref: 007F9720
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                          • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,007DF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 007F9742
                                                          • LoadStringW.USER32(00000000,?,007DF7F8,00000001), ref: 007F9745
                                                          • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 007F9866
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message_wcslen
                                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                          • API String ID: 747408836-2268648507
                                                          • Opcode ID: be912dba7186dd1a5c49d0251d3ce903adf70e5dbad626e70b1cf8fb509f2e5e
                                                          • Instruction ID: f6eb78a52f2fec9f9f380ec997ebacaf34fa59e09d6a7693c5145c06b94597f7
                                                          • Opcode Fuzzy Hash: be912dba7186dd1a5c49d0251d3ce903adf70e5dbad626e70b1cf8fb509f2e5e
                                                          • Instruction Fuzzy Hash: 97413D72800209EADF04EBE4ED4AEFEB778AF55340F504169F60572192EB696F48CA61
                                                          APIs
                                                            • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 007F07A2
                                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 007F07BE
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 007F07DA
                                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 007F0804
                                                          • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 007F082C
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 007F0837
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 007F083C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                          • API String ID: 323675364-22481851
                                                          • Opcode ID: 55582e8bd808971a172f4ead96cb4219263966135e2ae5624b9bea2d644d8619
                                                          • Instruction ID: 531053bbef292b8ded272602192bf614a72580e5d910a45e3f9f25e51f20fcdd
                                                          • Opcode Fuzzy Hash: 55582e8bd808971a172f4ead96cb4219263966135e2ae5624b9bea2d644d8619
                                                          • Instruction Fuzzy Hash: 9F410872C10629EBDF21EBA4EC99CFDB778FF04350B044169E911A3261EB385E04CBA0
                                                          APIs
                                                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0082403B
                                                          • CreateCompatibleDC.GDI32(00000000), ref: 00824042
                                                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00824055
                                                          • SelectObject.GDI32(00000000,00000000), ref: 0082405D
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 00824068
                                                          • DeleteDC.GDI32(00000000), ref: 00824072
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 0082407C
                                                          • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00824092
                                                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 0082409E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                          • String ID: static
                                                          • API String ID: 2559357485-2160076837
                                                          • Opcode ID: 4128cb268c1962feb920e1514f2a3791a3bae6b478fd16e7989a3fafea76636b
                                                          • Instruction ID: 1e06d29f01ef5380c5da00d44c3b4ca19f1e17c0e6da89ccba577e951fc2e706
                                                          • Opcode Fuzzy Hash: 4128cb268c1962feb920e1514f2a3791a3bae6b478fd16e7989a3fafea76636b
                                                          • Instruction Fuzzy Hash: 7D316D31101225ABDF219FA8EC09FEE3BA8FF0D720F114211FA15E61A0C775D8A1DBA4
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00813C5C
                                                          • CoInitialize.OLE32(00000000), ref: 00813C8A
                                                          • CoUninitialize.OLE32 ref: 00813C94
                                                          • _wcslen.LIBCMT ref: 00813D2D
                                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 00813DB1
                                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 00813ED5
                                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00813F0E
                                                          • CoGetObject.OLE32(?,00000000,0082FB98,?), ref: 00813F2D
                                                          • SetErrorMode.KERNEL32(00000000), ref: 00813F40
                                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00813FC4
                                                          • VariantClear.OLEAUT32(?), ref: 00813FD8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                          • String ID:
                                                          • API String ID: 429561992-0
                                                          • Opcode ID: 6ef835e32a2f964f7983b78631968f7156b07ab8f33a76d3ac3182c4fba8dcab
                                                          • Instruction ID: 541115aa48435784aa4853d0c681f16df4c966d0b95a910e028d850578efee17
                                                          • Opcode Fuzzy Hash: 6ef835e32a2f964f7983b78631968f7156b07ab8f33a76d3ac3182c4fba8dcab
                                                          • Instruction Fuzzy Hash: B3C12371608205AFD700DF68C88496AB7E9FF89748F00492DF98ADB251DB31EE46CB52
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 00807AF3
                                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00807B8F
                                                          • SHGetDesktopFolder.SHELL32(?), ref: 00807BA3
                                                          • CoCreateInstance.OLE32(0082FD08,00000000,00000001,00856E6C,?), ref: 00807BEF
                                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00807C74
                                                          • CoTaskMemFree.OLE32(?,?), ref: 00807CCC
                                                          • SHBrowseForFolderW.SHELL32(?), ref: 00807D57
                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00807D7A
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00807D81
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00807DD6
                                                          • CoUninitialize.OLE32 ref: 00807DDC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                          • String ID:
                                                          • API String ID: 2762341140-0
                                                          • Opcode ID: 2cc8294391ddc63808e554eb7e39e8e883fb55c97916a70c9e3dbbc807dae1d9
                                                          • Instruction ID: fbb10deb4dfb5e4246c5a2144d5005d6e94ff6779856af4c5939ec012184fd21
                                                          • Opcode Fuzzy Hash: 2cc8294391ddc63808e554eb7e39e8e883fb55c97916a70c9e3dbbc807dae1d9
                                                          • Instruction Fuzzy Hash: 09C13975A04109EFDB54DFA4C888DAEBBF9FF48314B1484A8E919DB261D730EE41CB90
                                                          APIs
                                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00825504
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00825515
                                                          • CharNextW.USER32(00000158), ref: 00825544
                                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00825585
                                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0082559B
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 008255AC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CharNext
                                                          • String ID:
                                                          • API String ID: 1350042424-0
                                                          • Opcode ID: c76ff527d8d52dbb2ad7bf51640ae0bf2e188265a03b10bd8bfa4d00bae525d1
                                                          • Instruction ID: 5e75e1a2c6de396cd158ffea071bc64cb6f0c8887c40947f6cfbbfb9226d3ed3
                                                          • Opcode Fuzzy Hash: c76ff527d8d52dbb2ad7bf51640ae0bf2e188265a03b10bd8bfa4d00bae525d1
                                                          • Instruction Fuzzy Hash: 3A617C70940628EBDF209F94EC84AFE7BB9FF09724F108149F925E6290D7748AC1DB61
                                                          APIs
                                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 007EFAAF
                                                          • SafeArrayAllocData.OLEAUT32(?), ref: 007EFB08
                                                          • VariantInit.OLEAUT32(?), ref: 007EFB1A
                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 007EFB3A
                                                          • VariantCopy.OLEAUT32(?,?), ref: 007EFB8D
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 007EFBA1
                                                          • VariantClear.OLEAUT32(?), ref: 007EFBB6
                                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 007EFBC3
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 007EFBCC
                                                          • VariantClear.OLEAUT32(?), ref: 007EFBDE
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 007EFBE9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                          • String ID:
                                                          • API String ID: 2706829360-0
                                                          • Opcode ID: 21512aece9a5b3f2b966d163c3002e08e90b7cb1bf33bf66547c90aa1cfe3320
                                                          • Instruction ID: 2721d3d119432ea16e04cb341c575aed42fa8a17a7b5d72834efee4078f06508
                                                          • Opcode Fuzzy Hash: 21512aece9a5b3f2b966d163c3002e08e90b7cb1bf33bf66547c90aa1cfe3320
                                                          • Instruction Fuzzy Hash: 61415075A01219EFCF10EF69DC589AEBBB9FF48354F00C065E905E7261D734A946CBA0
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 007F9CA1
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 007F9D22
                                                          • GetKeyState.USER32(000000A0), ref: 007F9D3D
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 007F9D57
                                                          • GetKeyState.USER32(000000A1), ref: 007F9D6C
                                                          • GetAsyncKeyState.USER32(00000011), ref: 007F9D84
                                                          • GetKeyState.USER32(00000011), ref: 007F9D96
                                                          • GetAsyncKeyState.USER32(00000012), ref: 007F9DAE
                                                          • GetKeyState.USER32(00000012), ref: 007F9DC0
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 007F9DD8
                                                          • GetKeyState.USER32(0000005B), ref: 007F9DEA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: c834f1a0316d950828491d83ac282040aac3b32cae39caed9ae681dbd7734b39
                                                          • Instruction ID: 78922f8a3367252372c8cc54dea07330373eb24b006fa21392ae9a61194609aa
                                                          • Opcode Fuzzy Hash: c834f1a0316d950828491d83ac282040aac3b32cae39caed9ae681dbd7734b39
                                                          • Instruction Fuzzy Hash: BB41A634604BCD69FF71967488043B5BEA07F12344F14805ADBC6567C2EBAD99C8C7A2
                                                          APIs
                                                          • WSAStartup.WSOCK32(00000101,?), ref: 008105BC
                                                          • inet_addr.WSOCK32(?), ref: 0081061C
                                                          • gethostbyname.WSOCK32(?), ref: 00810628
                                                          • IcmpCreateFile.IPHLPAPI ref: 00810636
                                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 008106C6
                                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 008106E5
                                                          • IcmpCloseHandle.IPHLPAPI(?), ref: 008107B9
                                                          • WSACleanup.WSOCK32 ref: 008107BF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                          • String ID: Ping
                                                          • API String ID: 1028309954-2246546115
                                                          • Opcode ID: f2a6cf011021013d91df4a5344a79acff91f8fdb67d260c748a72d37a5e5d970
                                                          • Instruction ID: 8abc471a38a3be8604506699b2237290abefd9527675d6d1393bc547f8cb0d48
                                                          • Opcode Fuzzy Hash: f2a6cf011021013d91df4a5344a79acff91f8fdb67d260c748a72d37a5e5d970
                                                          • Instruction Fuzzy Hash: CF919A356042019FD720CF15D889F5ABBE4FF88318F0489A9E469DB6A2C7B5EC81CF81
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharLower
                                                          • String ID: cdecl$none$stdcall$winapi
                                                          • API String ID: 707087890-567219261
                                                          • Opcode ID: 711fd48231cc256dfce45499b00ab701545866ffdba484ddc118d29b2a6cf2a0
                                                          • Instruction ID: 6cd65a74900288445db4e0cb3772bd824107d20056aaf63a13504e54bc13bd4a
                                                          • Opcode Fuzzy Hash: 711fd48231cc256dfce45499b00ab701545866ffdba484ddc118d29b2a6cf2a0
                                                          • Instruction Fuzzy Hash: 28518F31A00116DBCF14DF68D9429FEB7AAFF65324B204229E926E72C4DB34DD84C790
                                                          APIs
                                                          • CoInitialize.OLE32 ref: 00813774
                                                          • CoUninitialize.OLE32 ref: 0081377F
                                                          • CoCreateInstance.OLE32(?,00000000,00000017,0082FB78,?), ref: 008137D9
                                                          • IIDFromString.OLE32(?,?), ref: 0081384C
                                                          • VariantInit.OLEAUT32(?), ref: 008138E4
                                                          • VariantClear.OLEAUT32(?), ref: 00813936
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                          • API String ID: 636576611-1287834457
                                                          • Opcode ID: ed2ca149a3740a4667a02e82923d70c2a6515334d3b8cbe241f74946c9c478fb
                                                          • Instruction ID: c119614c6a9bcc543041f41f2e555e9f1116a78a199376e76aff44b660973c7c
                                                          • Opcode Fuzzy Hash: ed2ca149a3740a4667a02e82923d70c2a6515334d3b8cbe241f74946c9c478fb
                                                          • Instruction Fuzzy Hash: 39618C70608301AFD710DF54D888BAABBE8FF49714F104829F985DB291C774EE88CB92
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 008033CF
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                          • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 008033F0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: LoadString$_wcslen
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 4099089115-3080491070
                                                          • Opcode ID: 3620dc438e0ebddb39e87246340c4e0dc29d701d89b16bfb406fffdf14ce18d8
                                                          • Instruction ID: 9597cd344a7c57b94f554dc2a933413750e5efec0afe6fd1b48eb3e9f072476b
                                                          • Opcode Fuzzy Hash: 3620dc438e0ebddb39e87246340c4e0dc29d701d89b16bfb406fffdf14ce18d8
                                                          • Instruction Fuzzy Hash: 93519C72800209EADF15EBA0DD4AEEEB778FF14340F144165F515B22A2EB792F58DB60
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                          • API String ID: 1256254125-769500911
                                                          • Opcode ID: dc2a8ee3aef82256c3f2e95fd7800583718f24f660b8506ac050ddb3b256d5c6
                                                          • Instruction ID: 2f48cf10c2362fca83cd80ada2b53440e388edeceb2fc0f45a10f05b8aaf9aae
                                                          • Opcode Fuzzy Hash: dc2a8ee3aef82256c3f2e95fd7800583718f24f660b8506ac050ddb3b256d5c6
                                                          • Instruction Fuzzy Hash: CA41B632A0112ADBCB206F7DCC905BE77A5BFA4764B244229E621DB384F739DD85C790
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 008053A0
                                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00805416
                                                          • GetLastError.KERNEL32 ref: 00805420
                                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 008054A7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Error$Mode$DiskFreeLastSpace
                                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                          • API String ID: 4194297153-14809454
                                                          • Opcode ID: c64cf05edd44ec82f4932bff8163b3832565ee8681a573b621f258915ca6fdb8
                                                          • Instruction ID: abba89c24541d36d4777ce9cc080c0f835ab63f12069e83ea6a96eea733e053a
                                                          • Opcode Fuzzy Hash: c64cf05edd44ec82f4932bff8163b3832565ee8681a573b621f258915ca6fdb8
                                                          • Instruction Fuzzy Hash: 6531D3B5A00908DFCB50DF68C889AEABBB4FF05305F548059E901CB2A2D731DD86CFA1
                                                          APIs
                                                          • CreateMenu.USER32 ref: 00823C79
                                                          • SetMenu.USER32(?,00000000), ref: 00823C88
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00823D10
                                                          • IsMenu.USER32(?), ref: 00823D24
                                                          • CreatePopupMenu.USER32 ref: 00823D2E
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00823D5B
                                                          • DrawMenuBar.USER32 ref: 00823D63
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                          • String ID: 0$F
                                                          • API String ID: 161812096-3044882817
                                                          • Opcode ID: 5aa7310370f29755c13b6edc58abb37fa908a36320c4b4b32617ccfe9beca193
                                                          • Instruction ID: f46cce4179c02593c26075cc4e2c54491e81e37fc18c7aea29aa4522baf759ea
                                                          • Opcode Fuzzy Hash: 5aa7310370f29755c13b6edc58abb37fa908a36320c4b4b32617ccfe9beca193
                                                          • Instruction Fuzzy Hash: 61418874A01219EFDF24CF64E854AAABBB5FF49300F144028E946E7360D774EA11CF90
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                          • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 007F1F64
                                                          • GetDlgCtrlID.USER32 ref: 007F1F6F
                                                          • GetParent.USER32 ref: 007F1F8B
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 007F1F8E
                                                          • GetDlgCtrlID.USER32(?), ref: 007F1F97
                                                          • GetParent.USER32(?), ref: 007F1FAB
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 007F1FAE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 711023334-1403004172
                                                          • Opcode ID: 438ff7a4d8f997bf717aee57ed2c71495ba71ce98090a5c42fe8a6737a387be4
                                                          • Instruction ID: 1d8a40a03b60881c24ba9daf0983e6c5c8c9226d985f98702ff35ae86ef8103d
                                                          • Opcode Fuzzy Hash: 438ff7a4d8f997bf717aee57ed2c71495ba71ce98090a5c42fe8a6737a387be4
                                                          • Instruction Fuzzy Hash: B221AF70900218EBDF14EFA5DC99DFEBBA8EB15310F404159BA61A72A1DB385909DB60
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                          • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 007F2043
                                                          • GetDlgCtrlID.USER32 ref: 007F204E
                                                          • GetParent.USER32 ref: 007F206A
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 007F206D
                                                          • GetDlgCtrlID.USER32(?), ref: 007F2076
                                                          • GetParent.USER32(?), ref: 007F208A
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 007F208D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 711023334-1403004172
                                                          • Opcode ID: 3194740e7d9f03caa6e073e5432f0be61d5c9b6cdd25b83a541e0da04f4f2c50
                                                          • Instruction ID: 94c96f1ed98b16802cab59bc8cf6d8079df017a112fa709730c16345ba6d43be
                                                          • Opcode Fuzzy Hash: 3194740e7d9f03caa6e073e5432f0be61d5c9b6cdd25b83a541e0da04f4f2c50
                                                          • Instruction Fuzzy Hash: A221D471900218BBDF10AFA4DC49EFEBBB8FF15340F104409BA61A72A1DB794919DB70
                                                          APIs
                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00823A9D
                                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00823AA0
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00823AC7
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00823AEA
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00823B62
                                                          • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00823BAC
                                                          • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00823BC7
                                                          • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00823BE2
                                                          • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00823BF6
                                                          • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00823C13
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow
                                                          • String ID:
                                                          • API String ID: 312131281-0
                                                          • Opcode ID: 729bd1cf4577f71f730b3fc3fdf9970d51f36b8be2aba0834ab5acf70eb197c7
                                                          • Instruction ID: 31d72e4892d9737bd7c13783d3a73ad11d6c49e45c2995278cbaa2abb2e4d40e
                                                          • Opcode Fuzzy Hash: 729bd1cf4577f71f730b3fc3fdf9970d51f36b8be2aba0834ab5acf70eb197c7
                                                          • Instruction Fuzzy Hash: 15618975900218AFDB10DFA8DC95EEE77B8FB09710F14009AFA15E72A2C774AE81DB50
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 007FB151
                                                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB165
                                                          • GetWindowThreadProcessId.USER32(00000000), ref: 007FB16C
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB17B
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 007FB18D
                                                          • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB1A6
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB1B8
                                                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB1FD
                                                          • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB212
                                                          • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB21D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                          • String ID:
                                                          • API String ID: 2156557900-0
                                                          • Opcode ID: 0ba5a31f9abe303752454fc651d4f1841ea3e983e20644f79a7cb81a382b6864
                                                          • Instruction ID: f34301f0a5ca896d6c7366f90e0286e6c3c0c729c6bff50163978e0c58490073
                                                          • Opcode Fuzzy Hash: 0ba5a31f9abe303752454fc651d4f1841ea3e983e20644f79a7cb81a382b6864
                                                          • Instruction Fuzzy Hash: 14318DB5500608BFEB209F64DC48BBD7BA9FBA1321F119019FB05D6290D7B89E458F61
                                                          APIs
                                                          • _free.LIBCMT ref: 007C2C94
                                                            • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                            • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                          • _free.LIBCMT ref: 007C2CA0
                                                          • _free.LIBCMT ref: 007C2CAB
                                                          • _free.LIBCMT ref: 007C2CB6
                                                          • _free.LIBCMT ref: 007C2CC1
                                                          • _free.LIBCMT ref: 007C2CCC
                                                          • _free.LIBCMT ref: 007C2CD7
                                                          • _free.LIBCMT ref: 007C2CE2
                                                          • _free.LIBCMT ref: 007C2CED
                                                          • _free.LIBCMT ref: 007C2CFB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: c8d4d671216b774df3d06d03098e9046d6387746a31d8e7b96f721898edbecb5
                                                          • Instruction ID: ae70cf53277b433889f567f6eccfe88be024aa02f433928240695eb3e2723d7d
                                                          • Opcode Fuzzy Hash: c8d4d671216b774df3d06d03098e9046d6387746a31d8e7b96f721898edbecb5
                                                          • Instruction Fuzzy Hash: D3118076100108EFCB02EF94D886E9D3BA5BF05350F5144A9FA48AB232DA35EA519F90
                                                          APIs
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00807FAD
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00807FC1
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00807FEB
                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00808005
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00808017
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00808060
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 008080B0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$AttributesFile
                                                          • String ID: *.*
                                                          • API String ID: 769691225-438819550
                                                          • Opcode ID: 09fe5a47267959c940d3cb2d5891066b4bd75dc262b4722877c13b19ab9848b2
                                                          • Instruction ID: 163faf5c8efbe01031da2b9d447e1ebd556a2d4a64ea088c7e68eaea6f11d3ac
                                                          • Opcode Fuzzy Hash: 09fe5a47267959c940d3cb2d5891066b4bd75dc262b4722877c13b19ab9848b2
                                                          • Instruction Fuzzy Hash: E9819072908245DBCB60EF14C8449AEB3E9FF89714F54886EF885C7290EB35ED45CB52
                                                          APIs
                                                          • SetWindowLongW.USER32(?,000000EB), ref: 00795C7A
                                                            • Part of subcall function 00795D0A: GetClientRect.USER32(?,?), ref: 00795D30
                                                            • Part of subcall function 00795D0A: GetWindowRect.USER32(?,?), ref: 00795D71
                                                            • Part of subcall function 00795D0A: ScreenToClient.USER32(?,?), ref: 00795D99
                                                          • GetDC.USER32 ref: 007D46F5
                                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 007D4708
                                                          • SelectObject.GDI32(00000000,00000000), ref: 007D4716
                                                          • SelectObject.GDI32(00000000,00000000), ref: 007D472B
                                                          • ReleaseDC.USER32(?,00000000), ref: 007D4733
                                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 007D47C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                          • String ID: U
                                                          • API String ID: 4009187628-3372436214
                                                          • Opcode ID: a841ffcefa8c8851f360938bc361b3ae9c66af460e6d870c2eab5a76c14a0797
                                                          • Instruction ID: 9782fcd2aab76b3284bbec311cf1d32c9bb9e01680b950fd311b007a561a4e00
                                                          • Opcode Fuzzy Hash: a841ffcefa8c8851f360938bc361b3ae9c66af460e6d870c2eab5a76c14a0797
                                                          • Instruction Fuzzy Hash: 7771D131500205DFCF228F64D984ABA7BB6FF4A360F18426AED565A3A6C739DC41DF60
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 008035E4
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                          • LoadStringW.USER32(00862390,?,00000FFF,?), ref: 0080360A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: LoadString$_wcslen
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 4099089115-2391861430
                                                          • Opcode ID: 02967f8cb2d06e7900f5a8bdb1fa293d3c6681ff0b532f788f5c1d41850422d5
                                                          • Instruction ID: 71efcacea93009122cded72c76f2d267a390dc6e88f1d3c0e6e9d8c81664da85
                                                          • Opcode Fuzzy Hash: 02967f8cb2d06e7900f5a8bdb1fa293d3c6681ff0b532f788f5c1d41850422d5
                                                          • Instruction Fuzzy Hash: FF515171800109FADF15EBA0DC4AEEDBB78FF14340F144129F615B22A1EB791B99DBA1
                                                          APIs
                                                            • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                            • Part of subcall function 007A912D: GetCursorPos.USER32(?), ref: 007A9141
                                                            • Part of subcall function 007A912D: ScreenToClient.USER32(00000000,?), ref: 007A915E
                                                            • Part of subcall function 007A912D: GetAsyncKeyState.USER32(00000001), ref: 007A9183
                                                            • Part of subcall function 007A912D: GetAsyncKeyState.USER32(00000002), ref: 007A919D
                                                          • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00828B6B
                                                          • ImageList_EndDrag.COMCTL32 ref: 00828B71
                                                          • ReleaseCapture.USER32 ref: 00828B77
                                                          • SetWindowTextW.USER32(?,00000000), ref: 00828C12
                                                          • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00828C25
                                                          • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00828CFF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                          • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                          • API String ID: 1924731296-2107944366
                                                          • Opcode ID: ceef3df943e0e9c2502fb6e0dc2708bb8afe47a5807dbe94944cd0f5899d1da8
                                                          • Instruction ID: ed744d5fa5af16582984ac58621868e9bd90a74cd314d00fd24fbcf49009f3e2
                                                          • Opcode Fuzzy Hash: ceef3df943e0e9c2502fb6e0dc2708bb8afe47a5807dbe94944cd0f5899d1da8
                                                          • Instruction Fuzzy Hash: DB519C71105314AFEB10DF24EC5AFAA77E4FB88714F40062DFA56972E2CB749944CB62
                                                          APIs
                                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0080C272
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0080C29A
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0080C2CA
                                                          • GetLastError.KERNEL32 ref: 0080C322
                                                          • SetEvent.KERNEL32(?), ref: 0080C336
                                                          • InternetCloseHandle.WININET(00000000), ref: 0080C341
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                          • String ID:
                                                          • API String ID: 3113390036-3916222277
                                                          • Opcode ID: 50dce172bcb3b34689aaf34a1b92669320ff531969ddd5ba6cda0cadf3f35f93
                                                          • Instruction ID: 341a6e76168e87c015857d13addd3f22aa597ed73cc4611f53eee802d1665067
                                                          • Opcode Fuzzy Hash: 50dce172bcb3b34689aaf34a1b92669320ff531969ddd5ba6cda0cadf3f35f93
                                                          • Instruction Fuzzy Hash: 393149B1600608AFD7719FA98C89ABB7AFCFB49744F14861EF446D2280DB34DD059BA1
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,007D3AAF,?,?,Bad directive syntax error,0082CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 007F98BC
                                                          • LoadStringW.USER32(00000000,?,007D3AAF,?), ref: 007F98C3
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 007F9987
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadMessageModuleString_wcslen
                                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                          • API String ID: 858772685-4153970271
                                                          • Opcode ID: 89381a5c8e28f74921f445f80b17bbcfeef8d872bc0cecd9be723088cc5c6967
                                                          • Instruction ID: 78299dc4df60209f2da1503fc1260ef3373f9d524708282da2661724d3c034e8
                                                          • Opcode Fuzzy Hash: 89381a5c8e28f74921f445f80b17bbcfeef8d872bc0cecd9be723088cc5c6967
                                                          • Instruction Fuzzy Hash: F8216F3184021DEBDF11AF90DC0AEFE7779FF14301F044459F615621A1EA79A628DB60
                                                          APIs
                                                          • GetParent.USER32 ref: 007F20AB
                                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 007F20C0
                                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 007F214D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameParentSend
                                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                          • API String ID: 1290815626-3381328864
                                                          • Opcode ID: f80b7d1c9f8b57ddb88c79c676a3339505c3d5b436da6f9f3d278b37fb564084
                                                          • Instruction ID: 99ae6d631c0a8d8130bf7fc1e47456e69b79a7c63604d635b646f2edd95c55d2
                                                          • Opcode Fuzzy Hash: f80b7d1c9f8b57ddb88c79c676a3339505c3d5b436da6f9f3d278b37fb564084
                                                          • Instruction Fuzzy Hash: 3511277628870EF9FA1122209C1BDFA739CEB15325B204116FB04E42D3FB6DA80B5619
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                          • String ID:
                                                          • API String ID: 1282221369-0
                                                          • Opcode ID: cd79d9fd22bd7c709edceef0bab013fc1184eaa8439f352b2a5d79df559a74e7
                                                          • Instruction ID: 266c582803aee034355baa6673a9c45b1070f8b47a03223ab81298e88d6b3f4d
                                                          • Opcode Fuzzy Hash: cd79d9fd22bd7c709edceef0bab013fc1184eaa8439f352b2a5d79df559a74e7
                                                          • Instruction Fuzzy Hash: A2613772904300AFDB32AFB49889F6E7BA5AF05320F05426DF948EB282D77D9D419B50
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 007E6890
                                                          • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 007E68A9
                                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 007E68B9
                                                          • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 007E68D1
                                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 007E68F2
                                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,007A8874,00000000,00000000,00000000,000000FF,00000000), ref: 007E6901
                                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 007E691E
                                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,007A8874,00000000,00000000,00000000,000000FF,00000000), ref: 007E692D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                          • String ID:
                                                          • API String ID: 1268354404-0
                                                          • Opcode ID: feb1cca37e6e1c8e07c6d99f66a039d95ae5278364bab052d041d65730c28368
                                                          • Instruction ID: 16b69450878d25d38401803ad697587a28fc53753c62a18df9a2ee40c218bc7e
                                                          • Opcode Fuzzy Hash: feb1cca37e6e1c8e07c6d99f66a039d95ae5278364bab052d041d65730c28368
                                                          • Instruction Fuzzy Hash: 39519BB0600209EFDB20DF25CC55FAA7BB5FF99350F144628F912972A0DB78E991DB60
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0080C182
                                                          • GetLastError.KERNEL32 ref: 0080C195
                                                          • SetEvent.KERNEL32(?), ref: 0080C1A9
                                                            • Part of subcall function 0080C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0080C272
                                                            • Part of subcall function 0080C253: GetLastError.KERNEL32 ref: 0080C322
                                                            • Part of subcall function 0080C253: SetEvent.KERNEL32(?), ref: 0080C336
                                                            • Part of subcall function 0080C253: InternetCloseHandle.WININET(00000000), ref: 0080C341
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                          • String ID:
                                                          • API String ID: 337547030-0
                                                          • Opcode ID: d0cb87f71462cc190df42e5e463a20b9db291e258d2dbf0beb995b526b78bf7f
                                                          • Instruction ID: ebfd3c5318661e6732b9dafc32c1dc5594ca3e62f75a853880169b401c746b2f
                                                          • Opcode Fuzzy Hash: d0cb87f71462cc190df42e5e463a20b9db291e258d2dbf0beb995b526b78bf7f
                                                          • Instruction Fuzzy Hash: 36318C71600605EFDB619FA9DD44A7ABBF8FF18300B00862DF956C2A50DB30E815ABA0
                                                          APIs
                                                            • Part of subcall function 007F3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 007F3A57
                                                            • Part of subcall function 007F3A3D: GetCurrentThreadId.KERNEL32 ref: 007F3A5E
                                                            • Part of subcall function 007F3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007F25B3), ref: 007F3A65
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 007F25BD
                                                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 007F25DB
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 007F25DF
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 007F25E9
                                                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 007F2601
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 007F2605
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 007F260F
                                                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 007F2623
                                                          • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 007F2627
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                          • String ID:
                                                          • API String ID: 2014098862-0
                                                          • Opcode ID: 2bf97a32e73006a19948ea23071913f27b3390e42c489c87d4c24fcbee5e70c5
                                                          • Instruction ID: f7151d5acb5518bbdcce7d7355b956f3f5734868186b24684cea78f87c12d92d
                                                          • Opcode Fuzzy Hash: 2bf97a32e73006a19948ea23071913f27b3390e42c489c87d4c24fcbee5e70c5
                                                          • Instruction Fuzzy Hash: 3D01D430390614BBFB2067699C8EF693F59EF5EB12F104005F328AF1D1C9E624569A69
                                                          APIs
                                                          • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,007F1449,?,?,00000000), ref: 007F180C
                                                          • HeapAlloc.KERNEL32(00000000,?,007F1449,?,?,00000000), ref: 007F1813
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,007F1449,?,?,00000000), ref: 007F1828
                                                          • GetCurrentProcess.KERNEL32(?,00000000,?,007F1449,?,?,00000000), ref: 007F1830
                                                          • DuplicateHandle.KERNEL32(00000000,?,007F1449,?,?,00000000), ref: 007F1833
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,007F1449,?,?,00000000), ref: 007F1843
                                                          • GetCurrentProcess.KERNEL32(007F1449,00000000,?,007F1449,?,?,00000000), ref: 007F184B
                                                          • DuplicateHandle.KERNEL32(00000000,?,007F1449,?,?,00000000), ref: 007F184E
                                                          • CreateThread.KERNEL32(00000000,00000000,007F1874,00000000,00000000,00000000), ref: 007F1868
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                          • String ID:
                                                          • API String ID: 1957940570-0
                                                          • Opcode ID: 68858aea46da432531036967a1b54308dcf8e07730e78119cd97fe4ff8522fc6
                                                          • Instruction ID: d4ab47c54f488b40fab98aca3d919ea45f5035fe5ecd010d15a8f49f791ca61c
                                                          • Opcode Fuzzy Hash: 68858aea46da432531036967a1b54308dcf8e07730e78119cd97fe4ff8522fc6
                                                          • Instruction Fuzzy Hash: 3D01BFB5640308BFE720AB65DC4EF6B7B6CFB89B11F508411FA05DB291C6749815CB60
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: __alldvrm$_strrchr
                                                          • String ID: }}{$}}{$}}{
                                                          • API String ID: 1036877536-3362948059
                                                          • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                          • Instruction ID: 382d1c7672091965978773cb88a9e076100139ac1b8e1d6416fcc4954cc8279b
                                                          • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                          • Instruction Fuzzy Hash: CFA14772E003869FDB21CF18C8A1FAEBBF5EF65350F1845ADE5859B282C23C8981C750
                                                          APIs
                                                            • Part of subcall function 007FD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 007FD501
                                                            • Part of subcall function 007FD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 007FD50F
                                                            • Part of subcall function 007FD4DC: CloseHandle.KERNELBASE(00000000), ref: 007FD5DC
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0081A16D
                                                          • GetLastError.KERNEL32 ref: 0081A180
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0081A1B3
                                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 0081A268
                                                          • GetLastError.KERNEL32(00000000), ref: 0081A273
                                                          • CloseHandle.KERNEL32(00000000), ref: 0081A2C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                          • String ID: SeDebugPrivilege
                                                          • API String ID: 2533919879-2896544425
                                                          • Opcode ID: ca0c099a9d90d0607e216d7dc3ee1667ef7fc71d9188cee548362cf6268cc430
                                                          • Instruction ID: fdcdf18c1bf07b151a143ab81d14be52c000c8b18f43745de059449e82d138d3
                                                          • Opcode Fuzzy Hash: ca0c099a9d90d0607e216d7dc3ee1667ef7fc71d9188cee548362cf6268cc430
                                                          • Instruction Fuzzy Hash: AD619C31205242AFD724DF14C498F69BBA5FF44318F58848CE46A8B7A2C776EC85CB82
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00823925
                                                          • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0082393A
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00823954
                                                          • _wcslen.LIBCMT ref: 00823999
                                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 008239C6
                                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 008239F4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window_wcslen
                                                          • String ID: SysListView32
                                                          • API String ID: 2147712094-78025650
                                                          • Opcode ID: 41edcac9abafdef83806e3ac9465ecf20239d464cf69ee7df7fc5559aaeb8d22
                                                          • Instruction ID: 23bb535010783b24bc0a04d1c81f8dbc7abbe18cb3ae4f21722c9fc431446de9
                                                          • Opcode Fuzzy Hash: 41edcac9abafdef83806e3ac9465ecf20239d464cf69ee7df7fc5559aaeb8d22
                                                          • Instruction Fuzzy Hash: 4B41A371A00229ABEF219F64DC49FEE7BA9FF08350F100526F958E7281D7759AC4CB90
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007FBCFD
                                                          • IsMenu.USER32(00000000), ref: 007FBD1D
                                                          • CreatePopupMenu.USER32 ref: 007FBD53
                                                          • GetMenuItemCount.USER32(012058E8), ref: 007FBDA4
                                                          • InsertMenuItemW.USER32(012058E8,?,00000001,00000030), ref: 007FBDCC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                          • String ID: 0$2
                                                          • API String ID: 93392585-3793063076
                                                          • Opcode ID: c440b3d8fefcb792e356208f6e35ca44c860d886a482e122566092f6fa0a76a4
                                                          • Instruction ID: 4048bd5710bc4f97e7db7ce92cc6fae5edfcfcfc1d61ea13159e03c686775cb1
                                                          • Opcode Fuzzy Hash: c440b3d8fefcb792e356208f6e35ca44c860d886a482e122566092f6fa0a76a4
                                                          • Instruction Fuzzy Hash: 50519E70B0020DDBDB24DFA8D988BBEBBF4BF45314F148159E61197391D778A941CB62
                                                          APIs
                                                          • _ValidateLocalCookies.LIBCMT ref: 007B2D4B
                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 007B2D53
                                                          • _ValidateLocalCookies.LIBCMT ref: 007B2DE1
                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 007B2E0C
                                                          • _ValidateLocalCookies.LIBCMT ref: 007B2E61
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                          • String ID: &H{$csm
                                                          • API String ID: 1170836740-2200307801
                                                          • Opcode ID: 226c42a77186194b240b98f728613f119761b2e68c0326a0ce68f8b77bbc7a77
                                                          • Instruction ID: 10ee86cc80fe3a6c91d5c4c75b8784c8484793eb6b2baed0c005912a8164e85c
                                                          • Opcode Fuzzy Hash: 226c42a77186194b240b98f728613f119761b2e68c0326a0ce68f8b77bbc7a77
                                                          • Instruction Fuzzy Hash: 83418034A01209EBCF10DF68C849BDEBBB5FF44364F148155E814AB393D739AA46CBA1
                                                          APIs
                                                          • LoadIconW.USER32(00000000,00007F03), ref: 007FC913
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: IconLoad
                                                          • String ID: blank$info$question$stop$warning
                                                          • API String ID: 2457776203-404129466
                                                          • Opcode ID: 887714a83c0330c24591b2f86ebeab0ca94bac068d637cd341325b6c50962d7a
                                                          • Instruction ID: 0808bdb201ecc9c2968723ccf2a05b8cf653d43e08f15178d07b20ac7dc1f569
                                                          • Opcode Fuzzy Hash: 887714a83c0330c24591b2f86ebeab0ca94bac068d637cd341325b6c50962d7a
                                                          • Instruction Fuzzy Hash: B5112B3168930EBEEB02DB54DD82DFE679CDF15365B50402AFA00E7382E7ADAE045264
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                          • String ID: 0.0.0.0
                                                          • API String ID: 642191829-3771769585
                                                          • Opcode ID: 58124d16432221e73aed56366168cfd9652148f7d24038854eae396e6fed6efb
                                                          • Instruction ID: 7909ba87be17401f673832e7e25d287a91fa14149006453f36c95f47ea416e6a
                                                          • Opcode Fuzzy Hash: 58124d16432221e73aed56366168cfd9652148f7d24038854eae396e6fed6efb
                                                          • Instruction Fuzzy Hash: B6110371904118EFCB30BB649C0EEFE77ADEF11711F0101B9F645AA291EF799E818A61
                                                          APIs
                                                            • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                          • GetSystemMetrics.USER32(0000000F), ref: 00829FC7
                                                          • GetSystemMetrics.USER32(0000000F), ref: 00829FE7
                                                          • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0082A224
                                                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0082A242
                                                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0082A263
                                                          • ShowWindow.USER32(00000003,00000000), ref: 0082A282
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 0082A2A7
                                                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 0082A2CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                          • String ID:
                                                          • API String ID: 1211466189-0
                                                          • Opcode ID: 5fae32357a2893c4f5bd73461a4d1c644e6e9b5f9ed300478f380ca1be4fba73
                                                          • Instruction ID: 6ccff2a151c6a42b3cbb6b79b3c1156d3d37e2603539f304167d10db8d2a50bd
                                                          • Opcode Fuzzy Hash: 5fae32357a2893c4f5bd73461a4d1c644e6e9b5f9ed300478f380ca1be4fba73
                                                          • Instruction Fuzzy Hash: 02B18931600229DFDF18CF68D9857AE7BB2FF44711F098069EC49DB295D731A990CB61
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$LocalTime
                                                          • String ID:
                                                          • API String ID: 952045576-0
                                                          • Opcode ID: a220e3450d141373a7d4a9668078fcb6540863b26c8c4f8b50b21b6db6d55ddd
                                                          • Instruction ID: f7890f16ccd1d9ccb1d71fd94305063ef367c7cb508c6a143653569089bb1668
                                                          • Opcode Fuzzy Hash: a220e3450d141373a7d4a9668078fcb6540863b26c8c4f8b50b21b6db6d55ddd
                                                          • Instruction Fuzzy Hash: 3A419666C10118B6DB11EBF48C8EADF77A8BF45710F508462E614E3222FB3CE655C3A6
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,007E682C,00000004,00000000,00000000), ref: 007AF953
                                                          • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,007E682C,00000004,00000000,00000000), ref: 007EF3D1
                                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,007E682C,00000004,00000000,00000000), ref: 007EF454
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: b5a02ca66d403662c43017161f16ba5fcf9498f3793ad8e75c4cf63b996917dd
                                                          • Instruction ID: 79fabeb420d3ab25be2e172200e209e9d1d5923addbccca41299d934c428077e
                                                          • Opcode Fuzzy Hash: b5a02ca66d403662c43017161f16ba5fcf9498f3793ad8e75c4cf63b996917dd
                                                          • Instruction Fuzzy Hash: 0A4118302056C0BEC7759B6D888877B7B91BBDB310F14863DE047D2961C63DB880CB52
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00822D1B
                                                          • GetDC.USER32(00000000), ref: 00822D23
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00822D2E
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00822D3A
                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00822D76
                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00822D87
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00825A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00822DC2
                                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00822DE1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                          • String ID:
                                                          • API String ID: 3864802216-0
                                                          • Opcode ID: 62b9972dd610a14a0bce79d0d3d9fe1558a66f9f8ca3a88b6366d74124b3f6a0
                                                          • Instruction ID: e5fd1b6ad4c927401ddb825d7c2f80c6674c2833901521195b80af444e0c420c
                                                          • Opcode Fuzzy Hash: 62b9972dd610a14a0bce79d0d3d9fe1558a66f9f8ca3a88b6366d74124b3f6a0
                                                          • Instruction Fuzzy Hash: 94318972201624BFEB218F549C8AFFB3BA9FF09711F048055FE08DA291C6759C91CBA4
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 7fe6feba54d9d25956e7c247d66ab44b9d8b5cd5f1507338d8ccb2c4b15a8967
                                                          • Instruction ID: 51e36369dc2713af9fb3685b3a065b9f307f28a7522798059d1b095b2d5a1340
                                                          • Opcode Fuzzy Hash: 7fe6feba54d9d25956e7c247d66ab44b9d8b5cd5f1507338d8ccb2c4b15a8967
                                                          • Instruction Fuzzy Hash: 0E218361644A2DB7D6146620DD96FFA23ACAF20794B840030FF25DB782F72CED10C6A5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: NULL Pointer assignment$Not an Object type
                                                          • API String ID: 0-572801152
                                                          • Opcode ID: 34bfabff811e5b59dc142f4c617719f325a4a1edb6afd93f706767e9c902b8c0
                                                          • Instruction ID: 7d70ecfbfb8ff03bc739c056bbcadbb10e58ae468660f78b73dbf1d8b0d7b4d3
                                                          • Opcode Fuzzy Hash: 34bfabff811e5b59dc142f4c617719f325a4a1edb6afd93f706767e9c902b8c0
                                                          • Instruction Fuzzy Hash: C2D17D71A0060AEFDB10CF98D881BEEB7B9FF88344F148569E915EB281D7709985CB90
                                                          APIs
                                                          • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,007D17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 007D15CE
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,007D17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 007D1651
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,007D17FB,?,007D17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 007D16E4
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,007D17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 007D16FB
                                                            • Part of subcall function 007C3820: RtlAllocateHeap.NTDLL(00000000,?,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6,?,00791129), ref: 007C3852
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,007D17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 007D1777
                                                          • __freea.LIBCMT ref: 007D17A2
                                                          • __freea.LIBCMT ref: 007D17AE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                          • String ID:
                                                          • API String ID: 2829977744-0
                                                          • Opcode ID: 885e53ed85ebbfffdb5adfbf3fcd677d311777fdf15071ad3b114cf0d1b40282
                                                          • Instruction ID: 2dccec73f3ce1f8873bcbd4af898703067f4846658a0f852493238a4b69bbe76
                                                          • Opcode Fuzzy Hash: 885e53ed85ebbfffdb5adfbf3fcd677d311777fdf15071ad3b114cf0d1b40282
                                                          • Instruction Fuzzy Hash: 2B91C471E00216BADB208E74DD85EEE7BB5AF49310F98466AE806E7351DB3DDD40CB60
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit
                                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                          • API String ID: 2610073882-625585964
                                                          • Opcode ID: aa339315863460dd6fc989e987f6b72bde03789ff844ac702469a796ec3eae87
                                                          • Instruction ID: 56beea37f6ae5cc035f9330a7d19d8d0b45a6e5f4e6412a1703bbfebc4ff6430
                                                          • Opcode Fuzzy Hash: aa339315863460dd6fc989e987f6b72bde03789ff844ac702469a796ec3eae87
                                                          • Instruction Fuzzy Hash: 6C916B71A00219ABDF20CFA4D888FEEBBB8FF46715F108559F515EB281D7709985CBA0
                                                          APIs
                                                          • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0080125C
                                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00801284
                                                          • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 008012A8
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008012D8
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0080135F
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008013C4
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00801430
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                          • String ID:
                                                          • API String ID: 2550207440-0
                                                          • Opcode ID: 08207785d5e61cc113752d454ea36b4400b03ae45bf442a34431ae499ae106f3
                                                          • Instruction ID: db8606b86ef554a769281e293c475b582d351fba0cb9a843b06e18396a55793f
                                                          • Opcode Fuzzy Hash: 08207785d5e61cc113752d454ea36b4400b03ae45bf442a34431ae499ae106f3
                                                          • Instruction Fuzzy Hash: CD91BE71A002099FEF50DFA8C889BBEB7B5FF45325F114029E901EB2A1D778A941CB95
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: 69d4b2e7ab9bc225a00ab4a3cff495542c46a46829741c44af502276886ce520
                                                          • Instruction ID: 2d7cfe500ab3b1cf07ba2ef0be7d2629edc294f9ec5cc73aa90d8b7d2a46ff33
                                                          • Opcode Fuzzy Hash: 69d4b2e7ab9bc225a00ab4a3cff495542c46a46829741c44af502276886ce520
                                                          • Instruction Fuzzy Hash: 63915C71D00219EFCB14CFA9CC89AEEBBB9FF89320F148155E515B7291D378A952CB60
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 0081396B
                                                          • CharUpperBuffW.USER32(?,?), ref: 00813A7A
                                                          • _wcslen.LIBCMT ref: 00813A8A
                                                          • VariantClear.OLEAUT32(?), ref: 00813C1F
                                                            • Part of subcall function 00800CDF: VariantInit.OLEAUT32(00000000), ref: 00800D1F
                                                            • Part of subcall function 00800CDF: VariantCopy.OLEAUT32(?,?), ref: 00800D28
                                                            • Part of subcall function 00800CDF: VariantClear.OLEAUT32(?), ref: 00800D34
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                          • API String ID: 4137639002-1221869570
                                                          • Opcode ID: 432b9f8b9334b4f4f4763fe923f87e91aeed3afa00942c59c4165482c97a0e4a
                                                          • Instruction ID: 401a5adb51fdd2c4a1149b1ed8ea353244a065a172040d69715a4dccf6d70a46
                                                          • Opcode Fuzzy Hash: 432b9f8b9334b4f4f4763fe923f87e91aeed3afa00942c59c4165482c97a0e4a
                                                          • Instruction Fuzzy Hash: 359125746083059FCB14DF28C4849AAB7E8FF89314F14892DF98A97351DB35EE45CB92
                                                          APIs
                                                            • Part of subcall function 007F000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?,?,007F035E), ref: 007F002B
                                                            • Part of subcall function 007F000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?), ref: 007F0046
                                                            • Part of subcall function 007F000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?), ref: 007F0054
                                                            • Part of subcall function 007F000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?), ref: 007F0064
                                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00814C51
                                                          • _wcslen.LIBCMT ref: 00814D59
                                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00814DCF
                                                          • CoTaskMemFree.OLE32(?), ref: 00814DDA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                          • String ID: NULL Pointer assignment
                                                          • API String ID: 614568839-2785691316
                                                          • Opcode ID: bf13abf699e8d5f7aa8a147327053cc0a8887750b69baf08cdba86453b22206e
                                                          • Instruction ID: de94dbc14a94ef1d39909dad09c0addc42f84f0a11bbd990458313b58157ce1b
                                                          • Opcode Fuzzy Hash: bf13abf699e8d5f7aa8a147327053cc0a8887750b69baf08cdba86453b22206e
                                                          • Instruction Fuzzy Hash: AD910371D0021DEBDF10DFA4D895AEEB7B9FF08314F10816AE915A7251EB349A85CFA0
                                                          APIs
                                                          • GetMenu.USER32(?), ref: 00822183
                                                          • GetMenuItemCount.USER32(00000000), ref: 008221B5
                                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 008221DD
                                                          • _wcslen.LIBCMT ref: 00822213
                                                          • GetMenuItemID.USER32(?,?), ref: 0082224D
                                                          • GetSubMenu.USER32(?,?), ref: 0082225B
                                                            • Part of subcall function 007F3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 007F3A57
                                                            • Part of subcall function 007F3A3D: GetCurrentThreadId.KERNEL32 ref: 007F3A5E
                                                            • Part of subcall function 007F3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007F25B3), ref: 007F3A65
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 008222E3
                                                            • Part of subcall function 007FE97B: Sleep.KERNELBASE ref: 007FE9F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                          • String ID:
                                                          • API String ID: 4196846111-0
                                                          • Opcode ID: 1f8dba48fe591143b6b12f79799f4b5d2ad219601a6a1c39ecffc5db1b929fa1
                                                          • Instruction ID: d356f280fb81a098947be9491bf37d915e09b258b4bcda82b717fe4f0ec7fef9
                                                          • Opcode Fuzzy Hash: 1f8dba48fe591143b6b12f79799f4b5d2ad219601a6a1c39ecffc5db1b929fa1
                                                          • Instruction Fuzzy Hash: 13719075A00225EFCB14EFA4D845AAEB7F1FF48310F148459E916EB351DB39ED818B90
                                                          APIs
                                                          • IsWindow.USER32(012059B0), ref: 00827F37
                                                          • IsWindowEnabled.USER32(012059B0), ref: 00827F43
                                                          • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 0082801E
                                                          • SendMessageW.USER32(012059B0,000000B0,?,?), ref: 00828051
                                                          • IsDlgButtonChecked.USER32(?,?), ref: 00828089
                                                          • GetWindowLongW.USER32(012059B0,000000EC), ref: 008280AB
                                                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 008280C3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                          • String ID:
                                                          • API String ID: 4072528602-0
                                                          • Opcode ID: 9eea29d52d0f250a5841a8b78f1b3b6d0158186d5266be1bac44ff0101d3fba7
                                                          • Instruction ID: 42f664d22777b6721c71c8edd20c8d8596e6792a833570a9187f2b873b257c0c
                                                          • Opcode Fuzzy Hash: 9eea29d52d0f250a5841a8b78f1b3b6d0158186d5266be1bac44ff0101d3fba7
                                                          • Instruction Fuzzy Hash: B771BC7460D224EFEF219F65E984FBABBB9FF19300F144059E945D72A1CB31A885CB21
                                                          APIs
                                                          • GetParent.USER32(?), ref: 007FAEF9
                                                          • GetKeyboardState.USER32(?), ref: 007FAF0E
                                                          • SetKeyboardState.USER32(?), ref: 007FAF6F
                                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 007FAF9D
                                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 007FAFBC
                                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 007FAFFD
                                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 007FB020
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: fb4fe666cb74b69cc9258be15657cc70c8cb86fc910df6583fe8eb5ef369b4af
                                                          • Instruction ID: a2b10dd5fd5f0a415b313de8a362f2f983dac8ee6b909827b7a05adab7fbcb51
                                                          • Opcode Fuzzy Hash: fb4fe666cb74b69cc9258be15657cc70c8cb86fc910df6583fe8eb5ef369b4af
                                                          • Instruction Fuzzy Hash: 6A51B3E06047D93DFB364234CC49BBA7EE96B06304F088589E2D9599C2D79CECC8D762
                                                          APIs
                                                          • GetParent.USER32(00000000), ref: 007FAD19
                                                          • GetKeyboardState.USER32(?), ref: 007FAD2E
                                                          • SetKeyboardState.USER32(?), ref: 007FAD8F
                                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 007FADBB
                                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 007FADD8
                                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 007FAE17
                                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 007FAE38
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 2eb4106086e7145ed7c51f8cdc46238dee8cc9f31d573d439ad1980f3726093a
                                                          • Instruction ID: 22896e2e06a5dae8e08dd6ca832b2710f53663930ce614f450da24a1edf1005b
                                                          • Opcode Fuzzy Hash: 2eb4106086e7145ed7c51f8cdc46238dee8cc9f31d573d439ad1980f3726093a
                                                          • Instruction Fuzzy Hash: 4D51C6E16447D93DFB368334CC56B7A7EA96B45300F088589E2DD46AC2D29CEC88D752
                                                          APIs
                                                          • GetConsoleCP.KERNEL32(007D3CD6,?,?,?,?,?,?,?,?,007C5BA3,?,?,007D3CD6,?,?), ref: 007C5470
                                                          • __fassign.LIBCMT ref: 007C54EB
                                                          • __fassign.LIBCMT ref: 007C5506
                                                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,007D3CD6,00000005,00000000,00000000), ref: 007C552C
                                                          • WriteFile.KERNEL32(?,007D3CD6,00000000,007C5BA3,00000000,?,?,?,?,?,?,?,?,?,007C5BA3,?), ref: 007C554B
                                                          • WriteFile.KERNEL32(?,?,00000001,007C5BA3,00000000,?,?,?,?,?,?,?,?,?,007C5BA3,?), ref: 007C5584
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                          • String ID:
                                                          • API String ID: 1324828854-0
                                                          • Opcode ID: d8eb01ef839cd82abf24ef2fb93394cdc15c5272b7dd2c4389ba952d732a1d24
                                                          • Instruction ID: ce7abcf679380bb1ff7c4e7beb2ea50ba0f699977127a0bd926a9c9f71553c88
                                                          • Opcode Fuzzy Hash: d8eb01ef839cd82abf24ef2fb93394cdc15c5272b7dd2c4389ba952d732a1d24
                                                          • Instruction Fuzzy Hash: 7751B570A006499FDB10CFA8E845FEEBBF5FF08300F14451EE555E7291E675AA91CB60
                                                          APIs
                                                            • Part of subcall function 0081304E: inet_addr.WSOCK32(?), ref: 0081307A
                                                            • Part of subcall function 0081304E: _wcslen.LIBCMT ref: 0081309B
                                                          • socket.WSOCK32(00000002,00000001,00000006), ref: 00811112
                                                          • WSAGetLastError.WSOCK32 ref: 00811121
                                                          • WSAGetLastError.WSOCK32 ref: 008111C9
                                                          • closesocket.WSOCK32(00000000), ref: 008111F9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 2675159561-0
                                                          • Opcode ID: 370815cf12d1eb227a428922b2c5482768638c3d7cce703354b20f964a1a0118
                                                          • Instruction ID: 0d4c5c413c992dcdd211c954c4d8c661951a047ea8d36d8c011ba90dbfc04c96
                                                          • Opcode Fuzzy Hash: 370815cf12d1eb227a428922b2c5482768638c3d7cce703354b20f964a1a0118
                                                          • Instruction Fuzzy Hash: 8141C232600604AFDF209F14D888BE9B7EAFF45324F148059FA19DB291D774AD81CBA1
                                                          APIs
                                                            • Part of subcall function 007FDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007FCF22,?), ref: 007FDDFD
                                                            • Part of subcall function 007FDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007FCF22,?), ref: 007FDE16
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 007FCF45
                                                          • MoveFileW.KERNEL32(?,?), ref: 007FCF7F
                                                          • _wcslen.LIBCMT ref: 007FD005
                                                          • _wcslen.LIBCMT ref: 007FD01B
                                                          • SHFileOperationW.SHELL32(?), ref: 007FD061
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                          • String ID: \*.*
                                                          • API String ID: 3164238972-1173974218
                                                          • Opcode ID: 18ff5a959e97dc946dc3066137453ed9b831f9e90ec10f625c3f6c65b5477d1a
                                                          • Instruction ID: cbcb0eea186e80ee8bd963fcb5bc5fc14f27bc56d4cc9f9690cf816a44f72bf1
                                                          • Opcode Fuzzy Hash: 18ff5a959e97dc946dc3066137453ed9b831f9e90ec10f625c3f6c65b5477d1a
                                                          • Instruction Fuzzy Hash: BB41587290511D9FDF22EBA4DA85AEDB7F9AF08340F0000E6E605E7251EB38AB44CB50
                                                          APIs
                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00822E1C
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00822E4F
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00822E84
                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00822EB6
                                                          • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00822EE0
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00822EF1
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00822F0B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$MessageSend
                                                          • String ID:
                                                          • API String ID: 2178440468-0
                                                          • Opcode ID: b1b1c8c956ff1eeaa3217e59e3248625b9375fe855ef35966f23af40b81c7472
                                                          • Instruction ID: 11ff562016e52dde70bf6d1b60ba1203b6df3f2d57be1641bd4b4364726e8fd1
                                                          • Opcode Fuzzy Hash: b1b1c8c956ff1eeaa3217e59e3248625b9375fe855ef35966f23af40b81c7472
                                                          • Instruction Fuzzy Hash: A131F438604164AFDB21CF58EC89F6937E1FB5A710F5A5164F911CB2B2CBB1A881AB41
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007F7769
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007F778F
                                                          • SysAllocString.OLEAUT32(00000000), ref: 007F7792
                                                          • SysAllocString.OLEAUT32(?), ref: 007F77B0
                                                          • SysFreeString.OLEAUT32(?), ref: 007F77B9
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 007F77DE
                                                          • SysAllocString.OLEAUT32(?), ref: 007F77EC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: 8627b5ba828f27d72d29d5927198d8da23a80170a3cdc6a2a4b42aacc029b07a
                                                          • Instruction ID: 717aa6b4758dc47816e0bde3a5014d967cbd5b21ad849fc440dc92bac19d6467
                                                          • Opcode Fuzzy Hash: 8627b5ba828f27d72d29d5927198d8da23a80170a3cdc6a2a4b42aacc029b07a
                                                          • Instruction Fuzzy Hash: 0C219F76608219AFDB14AFA8CC88CBB73ACEB093647108125FA14DB250D6749C42CBB4
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007F7842
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007F7868
                                                          • SysAllocString.OLEAUT32(00000000), ref: 007F786B
                                                          • SysAllocString.OLEAUT32 ref: 007F788C
                                                          • SysFreeString.OLEAUT32 ref: 007F7895
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 007F78AF
                                                          • SysAllocString.OLEAUT32(?), ref: 007F78BD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: 1d0917398af3289d081feedd768105f0b37a0cf16e9dceeaebfd1e9fe6bb539a
                                                          • Instruction ID: f4ef0beedc89d0381ac28df7526c0f2ea4c72f03180dfc70cb26f7eef92e0a8c
                                                          • Opcode Fuzzy Hash: 1d0917398af3289d081feedd768105f0b37a0cf16e9dceeaebfd1e9fe6bb539a
                                                          • Instruction Fuzzy Hash: 64214435608208AFDB24AFA8DC8DDBB77ECFB097A07108125FA15CB2A5D674DC41CB64
                                                          APIs
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 008004F2
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0080052E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHandlePipe
                                                          • String ID: nul
                                                          • API String ID: 1424370930-2873401336
                                                          • Opcode ID: 59d59c6a2de66e8deadec30f32e06baa85d42f2867ff3e3010e53988ba9b9d32
                                                          • Instruction ID: 822da73937458c85b1a993f184173eaa727ad39ed4b29553c4ca976d01b0e553
                                                          • Opcode Fuzzy Hash: 59d59c6a2de66e8deadec30f32e06baa85d42f2867ff3e3010e53988ba9b9d32
                                                          • Instruction Fuzzy Hash: 88215A75600305ABDB609F69DC45BAA7BB4FF45724F204A29E8A1E62E0E7709951CF20
                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 008005C6
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00800601
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHandlePipe
                                                          • String ID: nul
                                                          • API String ID: 1424370930-2873401336
                                                          • Opcode ID: addfef7413aee4de2c72deb58ffa638803f469ee44e85b5a885b13c8aed46201
                                                          • Instruction ID: 609f71f3d9ca4815badfc1e51034c45aa62a51e1eaa7bfd31731744afa6a7794
                                                          • Opcode Fuzzy Hash: addfef7413aee4de2c72deb58ffa638803f469ee44e85b5a885b13c8aed46201
                                                          • Instruction Fuzzy Hash: E921A1756003059BDB608F68DC04BAA77E5FFA5724F204A19F8B1E72E0DB719961CF10
                                                          APIs
                                                            • Part of subcall function 0079600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0079604C
                                                            • Part of subcall function 0079600E: GetStockObject.GDI32(00000011), ref: 00796060
                                                            • Part of subcall function 0079600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0079606A
                                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00824112
                                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0082411F
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0082412A
                                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00824139
                                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00824145
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CreateObjectStockWindow
                                                          • String ID: Msctls_Progress32
                                                          • API String ID: 1025951953-3636473452
                                                          • Opcode ID: 47e84f63eea42eebe3be96050314ba8291df1719a340de235d7433338dd28f80
                                                          • Instruction ID: 4abee027fd11f3781687de7256c1a8bc2cd809db517b11a7d03992e9491aa70f
                                                          • Opcode Fuzzy Hash: 47e84f63eea42eebe3be96050314ba8291df1719a340de235d7433338dd28f80
                                                          • Instruction Fuzzy Hash: 041181B1140229BEEF119F64DC85EE77F5DFF08798F015111BA18E2190C6769C619BA4
                                                          APIs
                                                            • Part of subcall function 007CD7A3: _free.LIBCMT ref: 007CD7CC
                                                          • _free.LIBCMT ref: 007CD82D
                                                            • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                            • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                          • _free.LIBCMT ref: 007CD838
                                                          • _free.LIBCMT ref: 007CD843
                                                          • _free.LIBCMT ref: 007CD897
                                                          • _free.LIBCMT ref: 007CD8A2
                                                          • _free.LIBCMT ref: 007CD8AD
                                                          • _free.LIBCMT ref: 007CD8B8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                          • Instruction ID: 27ade6682f56a3dd946bb67917d9acd128a599c5e94e803a55c9147544ec4270
                                                          • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                          • Instruction Fuzzy Hash: B911EF71541B04EAD531BFB0CC4BFCB7BDCAF05700F40582DB29DA69A3DA79B9064A50
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 007FDA74
                                                          • LoadStringW.USER32(00000000), ref: 007FDA7B
                                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 007FDA91
                                                          • LoadStringW.USER32(00000000), ref: 007FDA98
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 007FDADC
                                                          Strings
                                                          • %s (%d) : ==> %s: %s %s, xrefs: 007FDAB9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message
                                                          • String ID: %s (%d) : ==> %s: %s %s
                                                          • API String ID: 4072794657-3128320259
                                                          • Opcode ID: c8a1a875cd8e4344852048215a487d21e81484e8bf70402be1061810a1129270
                                                          • Instruction ID: 09145f1666e4ff52fabc4d5f787d1c9c41a17af18675665631494d8b41eafa5b
                                                          • Opcode Fuzzy Hash: c8a1a875cd8e4344852048215a487d21e81484e8bf70402be1061810a1129270
                                                          • Instruction Fuzzy Hash: 8B0186F25002087FE7209BE49D89EFB376CFB08301F408496B706E2141E6749E854F74
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(011FE428,011FE428), ref: 0080097B
                                                          • EnterCriticalSection.KERNEL32(011FE408,00000000), ref: 0080098D
                                                          • TerminateThread.KERNEL32(?,000001F6), ref: 0080099B
                                                          • WaitForSingleObject.KERNEL32(?,000003E8), ref: 008009A9
                                                          • CloseHandle.KERNEL32(?), ref: 008009B8
                                                          • InterlockedExchange.KERNEL32(011FE428,000001F6), ref: 008009C8
                                                          • LeaveCriticalSection.KERNEL32(011FE408), ref: 008009CF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 3495660284-0
                                                          • Opcode ID: e91cfd06ee4293593d91d5707d25552810adc50584793d7e02b60552e7653f87
                                                          • Instruction ID: 948e5d440d442a21f8ec465ba67b54c7473afdbcfa36dc50159296c50eb9ac91
                                                          • Opcode Fuzzy Hash: e91cfd06ee4293593d91d5707d25552810adc50584793d7e02b60552e7653f87
                                                          • Instruction Fuzzy Hash: 58F0F431442912FBD7615F94EE8DBEABB35FF05702F505015F101908A5CB759476CF90
                                                          APIs
                                                          • __WSAFDIsSet.WSOCK32(00000000,?), ref: 00811DC0
                                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00811DE1
                                                          • WSAGetLastError.WSOCK32 ref: 00811DF2
                                                          • htons.WSOCK32(?), ref: 00811EDB
                                                          • inet_ntoa.WSOCK32(?), ref: 00811E8C
                                                            • Part of subcall function 007F39E8: _strlen.LIBCMT ref: 007F39F2
                                                            • Part of subcall function 00813224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,0080EC0C), ref: 00813240
                                                          • _strlen.LIBCMT ref: 00811F35
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                          • String ID:
                                                          • API String ID: 3203458085-0
                                                          • Opcode ID: 8ccf0f26ced25cf143f11749995208ff9f2f9ff0487710929c3384668c70553a
                                                          • Instruction ID: c3a0dc51d1a2fb0a75caec4f2480cd1f635d6e63e8576c344e609e8977a82d06
                                                          • Opcode Fuzzy Hash: 8ccf0f26ced25cf143f11749995208ff9f2f9ff0487710929c3384668c70553a
                                                          • Instruction Fuzzy Hash: 7BB1D231204340EFCB24DF24D889E6A7BA9FF85318F54854CF5569B2A2DB31ED82CB91
                                                          APIs
                                                          • GetClientRect.USER32(?,?), ref: 00795D30
                                                          • GetWindowRect.USER32(?,?), ref: 00795D71
                                                          • ScreenToClient.USER32(?,?), ref: 00795D99
                                                          • GetClientRect.USER32(?,?), ref: 00795ED7
                                                          • GetWindowRect.USER32(?,?), ref: 00795EF8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Rect$Client$Window$Screen
                                                          • String ID:
                                                          • API String ID: 1296646539-0
                                                          • Opcode ID: e892cb29b7b4d285fdfd1fda8813fec93bf914bcbaa156f24cd5e77c5387f757
                                                          • Instruction ID: 6bca5b95474fbc1ff7e2b3f0d328da4fd5e090b43607974ec2882f59e2d838c6
                                                          • Opcode Fuzzy Hash: e892cb29b7b4d285fdfd1fda8813fec93bf914bcbaa156f24cd5e77c5387f757
                                                          • Instruction Fuzzy Hash: 73B16734A00A4ADBDF10CFA9D4807EEB7F1FF58310F14851AE8AAD7250DB38AA51DB50
                                                          APIs
                                                          • __allrem.LIBCMT ref: 007C00BA
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007C00D6
                                                          • __allrem.LIBCMT ref: 007C00ED
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007C010B
                                                          • __allrem.LIBCMT ref: 007C0122
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007C0140
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                          • String ID:
                                                          • API String ID: 1992179935-0
                                                          • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                          • Instruction ID: f7c80e27aa41f24a0e7fb6099b29083bb8eeb1f2f7780539d4561e17fa67407c
                                                          • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                          • Instruction Fuzzy Hash: 3E81D376A00B06EFE7209E68CC46FAEB3A9EF41724F24453EF551D6681E778D94087D0
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,007B82D9,007B82D9,?,?,?,007C644F,00000001,00000001,8BE85006), ref: 007C6258
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,007C644F,00000001,00000001,8BE85006,?,?,?), ref: 007C62DE
                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 007C63D8
                                                          • __freea.LIBCMT ref: 007C63E5
                                                            • Part of subcall function 007C3820: RtlAllocateHeap.NTDLL(00000000,?,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6,?,00791129), ref: 007C3852
                                                          • __freea.LIBCMT ref: 007C63EE
                                                          • __freea.LIBCMT ref: 007C6413
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1414292761-0
                                                          • Opcode ID: c46ee7fc4eb2d14a943ca36c743549e69d45bce8153c44a6e3f63eb9d0f50d2f
                                                          • Instruction ID: 36c582b1397ec5e416a60e28841bd34e05ca23488ae42d4d386c1930daae47bb
                                                          • Opcode Fuzzy Hash: c46ee7fc4eb2d14a943ca36c743549e69d45bce8153c44a6e3f63eb9d0f50d2f
                                                          • Instruction Fuzzy Hash: 1751CC72A00256ABEB258F64CCC5FBF7BAAEB44750B14862DF805D6181EB38DC40C6A0
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 0081C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0081B6AE,?,?), ref: 0081C9B5
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081C9F1
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA68
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0081BCCA
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0081BD25
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 0081BD6A
                                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0081BD99
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0081BDF3
                                                          • RegCloseKey.ADVAPI32(?), ref: 0081BDFF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                          • String ID:
                                                          • API String ID: 1120388591-0
                                                          • Opcode ID: 642c89d1b8ce532a06c27529be08f8d3a39f5b025a8711743ab3c320de21327d
                                                          • Instruction ID: f22d1c24d7a5998597cad8f7ab93027052da75e86a446705ba7a347843805144
                                                          • Opcode Fuzzy Hash: 642c89d1b8ce532a06c27529be08f8d3a39f5b025a8711743ab3c320de21327d
                                                          • Instruction Fuzzy Hash: 8F819E30208241EFD714DF24D895E6ABBE9FF84308F14895CF5598B2A2DB31ED85CB92
                                                          APIs
                                                          • VariantInit.OLEAUT32(00000035), ref: 007EF7B9
                                                          • SysAllocString.OLEAUT32(00000001), ref: 007EF860
                                                          • VariantCopy.OLEAUT32(007EFA64,00000000), ref: 007EF889
                                                          • VariantClear.OLEAUT32(007EFA64), ref: 007EF8AD
                                                          • VariantCopy.OLEAUT32(007EFA64,00000000), ref: 007EF8B1
                                                          • VariantClear.OLEAUT32(?), ref: 007EF8BB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCopy$AllocInitString
                                                          • String ID:
                                                          • API String ID: 3859894641-0
                                                          • Opcode ID: b1d5a2c31381473776085cdf9b01466cda45c91f6f3b73dda3a47ca6ef518d2b
                                                          • Instruction ID: 9f0722f24a6f0537b3afe591ab64159996445ba0914a31f9a249e79ad18e123b
                                                          • Opcode Fuzzy Hash: b1d5a2c31381473776085cdf9b01466cda45c91f6f3b73dda3a47ca6ef518d2b
                                                          • Instruction Fuzzy Hash: 7B51E831602350FADF20AF66D899B39B3A8EF49310F209467F945DF692DB789C40C796
                                                          APIs
                                                            • Part of subcall function 00797620: _wcslen.LIBCMT ref: 00797625
                                                            • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                          • GetOpenFileNameW.COMDLG32(00000058), ref: 008094E5
                                                          • _wcslen.LIBCMT ref: 00809506
                                                          • _wcslen.LIBCMT ref: 0080952D
                                                          • GetSaveFileNameW.COMDLG32(00000058), ref: 00809585
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$FileName$OpenSave
                                                          • String ID: X
                                                          • API String ID: 83654149-3081909835
                                                          • Opcode ID: 876081b16f5c978d0832982946325121918343b57da30a14159bbe63941f9d9c
                                                          • Instruction ID: 62416353552688f865836c3bf7184dc6559d7ad5f0a27e4c6ded16da92cb4381
                                                          • Opcode Fuzzy Hash: 876081b16f5c978d0832982946325121918343b57da30a14159bbe63941f9d9c
                                                          • Instruction Fuzzy Hash: 0FE1BD71608300DFDB64DF24D885A6AB7E0FF85314F05896DF8999B2A2DB34ED05CB92
                                                          APIs
                                                            • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                          • BeginPaint.USER32(?,?,?), ref: 007A9241
                                                          • GetWindowRect.USER32(?,?), ref: 007A92A5
                                                          • ScreenToClient.USER32(?,?), ref: 007A92C2
                                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 007A92D3
                                                          • EndPaint.USER32(?,?,?,?,?), ref: 007A9321
                                                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 007E71EA
                                                            • Part of subcall function 007A9339: BeginPath.GDI32(00000000), ref: 007A9357
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                          • String ID:
                                                          • API String ID: 3050599898-0
                                                          • Opcode ID: 2dea78ca97738b30aac254ac7eaf8faa17360b9a05b55b1499fcac4f35f7fb10
                                                          • Instruction ID: 9206f036e184a040ea729af9ad1efd2c666e13c1d79ccd2b66a20cc053485299
                                                          • Opcode Fuzzy Hash: 2dea78ca97738b30aac254ac7eaf8faa17360b9a05b55b1499fcac4f35f7fb10
                                                          • Instruction Fuzzy Hash: DD418C70105300AFDB21DF25C889FBA7BB8FB9A720F140229FA54872A2C7759855DB62
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 0080080C
                                                          • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00800847
                                                          • EnterCriticalSection.KERNEL32(?), ref: 00800863
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 008008DC
                                                          • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 008008F3
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00800921
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                          • String ID:
                                                          • API String ID: 3368777196-0
                                                          • Opcode ID: 606a93612286c19efeb032baf436ad8118aa5cea19beedc5c360f986abe206bd
                                                          • Instruction ID: d6e62b334b9d976c001c08afea0602495b606c8d6fa55969442e5b4a8e2c9cb8
                                                          • Opcode Fuzzy Hash: 606a93612286c19efeb032baf436ad8118aa5cea19beedc5c360f986abe206bd
                                                          • Instruction Fuzzy Hash: F0414A71900205EFDF14AF94DC85AAA77B9FF44310F1480A9ED00DA29BDB34EE65DBA4
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,007EF3AB,00000000,?,?,00000000,?,007E682C,00000004,00000000,00000000), ref: 0082824C
                                                          • EnableWindow.USER32(?,00000000), ref: 00828272
                                                          • ShowWindow.USER32(FFFFFFFF,00000000), ref: 008282D1
                                                          • ShowWindow.USER32(?,00000004), ref: 008282E5
                                                          • EnableWindow.USER32(?,00000001), ref: 0082830B
                                                          • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0082832F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Show$Enable$MessageSend
                                                          • String ID:
                                                          • API String ID: 642888154-0
                                                          • Opcode ID: d2202f2b58919ea7a6db4c943c7e74bd0551a7dc32883469a3e094e80e6eb17f
                                                          • Instruction ID: 5e87c4c5b7a2f2d3e3f927d16af45bc2dd0d1ba523eccbf44561ca9840c2387f
                                                          • Opcode Fuzzy Hash: d2202f2b58919ea7a6db4c943c7e74bd0551a7dc32883469a3e094e80e6eb17f
                                                          • Instruction Fuzzy Hash: 8141A534602654EFDF21CF25E899BE47BE1FB0A714F195169E5088B263CB71A881CF51
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 007F4C95
                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 007F4CB2
                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 007F4CEA
                                                          • _wcslen.LIBCMT ref: 007F4D08
                                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 007F4D10
                                                          • _wcsstr.LIBVCRUNTIME ref: 007F4D1A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                          • String ID:
                                                          • API String ID: 72514467-0
                                                          • Opcode ID: 19d4a42283e35afaa8c575a84fc451c5f16bedfe5c57f9b3c2555dcbf138a2e7
                                                          • Instruction ID: 3b5e4344d26cb50c8de2b5c41bf2be4e7d795d6705db9e2ef8c8695b0dc6aaa0
                                                          • Opcode Fuzzy Hash: 19d4a42283e35afaa8c575a84fc451c5f16bedfe5c57f9b3c2555dcbf138a2e7
                                                          • Instruction Fuzzy Hash: E3210832304204BBEB255B79EC49E7F7BACEF55750F10807DFA05CA292EA69DC01D6A0
                                                          APIs
                                                            • Part of subcall function 00793AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00793A97,?,?,00792E7F,?,?,?,00000000), ref: 00793AC2
                                                          • _wcslen.LIBCMT ref: 0080587B
                                                          • CoInitialize.OLE32(00000000), ref: 00805995
                                                          • CoCreateInstance.OLE32(0082FCF8,00000000,00000001,0082FB68,?), ref: 008059AE
                                                          • CoUninitialize.OLE32 ref: 008059CC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 3172280962-24824748
                                                          • Opcode ID: 97591e9f5071419ae46bcef7bbfb2ce424b233d972ca2ce27357c57287333472
                                                          • Instruction ID: d8c94a308d0f577ea62069f41d923ab38c10b441aa4613d1ebe5261e5fb4e69d
                                                          • Opcode Fuzzy Hash: 97591e9f5071419ae46bcef7bbfb2ce424b233d972ca2ce27357c57287333472
                                                          • Instruction Fuzzy Hash: 5FD14271608601DFCB54DF24D89492BBBE1FF89720F148859F8899B2A1D731EC45CFA2
                                                          APIs
                                                            • Part of subcall function 007F0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007F0FCA
                                                            • Part of subcall function 007F0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007F0FD6
                                                            • Part of subcall function 007F0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 007F0FE5
                                                            • Part of subcall function 007F0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 007F0FEC
                                                            • Part of subcall function 007F0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 007F1002
                                                          • GetLengthSid.ADVAPI32(?,00000000,007F1335), ref: 007F17AE
                                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 007F17BA
                                                          • HeapAlloc.KERNEL32(00000000), ref: 007F17C1
                                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 007F17DA
                                                          • GetProcessHeap.KERNEL32(00000000,00000000,007F1335), ref: 007F17EE
                                                          • HeapFree.KERNEL32(00000000), ref: 007F17F5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                          • String ID:
                                                          • API String ID: 3008561057-0
                                                          • Opcode ID: 5c9a53f668dafbc3a51f2447fb0dc94aad0b52b002cd0db157406034a85a1519
                                                          • Instruction ID: 8aad5e6931d8de8cb6622977d174dd639fbf8b8e122263b36a03146e21c0a4d0
                                                          • Opcode Fuzzy Hash: 5c9a53f668dafbc3a51f2447fb0dc94aad0b52b002cd0db157406034a85a1519
                                                          • Instruction Fuzzy Hash: 37117C71900609FFDB20AFA4CC4ABBF7BA9FB45355F508018F54597211D739A945CB60
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 007F14FF
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 007F1506
                                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 007F1515
                                                          • CloseHandle.KERNEL32(00000004), ref: 007F1520
                                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 007F154F
                                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 007F1563
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                          • String ID:
                                                          • API String ID: 1413079979-0
                                                          • Opcode ID: 4f2172d7abfdca4526766cf408cdbd87176f5c2ee484e92b866d4ad9040a5fad
                                                          • Instruction ID: dcf09848c863467e847a9db1c5f9c496aa09c70c1832674632c39cc52e33175a
                                                          • Opcode Fuzzy Hash: 4f2172d7abfdca4526766cf408cdbd87176f5c2ee484e92b866d4ad9040a5fad
                                                          • Instruction Fuzzy Hash: 4E11177250024DEBDB218F98DD49BEE7BA9FF48744F148015FA05A2160C3758E619B61
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,007B3379,007B2FE5), ref: 007B3390
                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 007B339E
                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 007B33B7
                                                          • SetLastError.KERNEL32(00000000,?,007B3379,007B2FE5), ref: 007B3409
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastValue___vcrt_
                                                          • String ID:
                                                          • API String ID: 3852720340-0
                                                          • Opcode ID: 139d3e49704821a1f83d7fc6bde7c89ac903fedee859d8f6eaf52efdab83ee8f
                                                          • Instruction ID: ebbe57718831fa59c83506738c37a5dba9b41ba6360102f8671de15cac94a954
                                                          • Opcode Fuzzy Hash: 139d3e49704821a1f83d7fc6bde7c89ac903fedee859d8f6eaf52efdab83ee8f
                                                          • Instruction Fuzzy Hash: 2201F733609711FEAA252774BC8ABEB2B94FB1537A720022DF411862F1EF1D5D829954
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,007C5686,007D3CD6,?,00000000,?,007C5B6A,?,?,?,?,?,007BE6D1,?,00858A48), ref: 007C2D78
                                                          • _free.LIBCMT ref: 007C2DAB
                                                          • _free.LIBCMT ref: 007C2DD3
                                                          • SetLastError.KERNEL32(00000000,?,?,?,?,007BE6D1,?,00858A48,00000010,00794F4A,?,?,00000000,007D3CD6), ref: 007C2DE0
                                                          • SetLastError.KERNEL32(00000000,?,?,?,?,007BE6D1,?,00858A48,00000010,00794F4A,?,?,00000000,007D3CD6), ref: 007C2DEC
                                                          • _abort.LIBCMT ref: 007C2DF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free$_abort
                                                          • String ID:
                                                          • API String ID: 3160817290-0
                                                          • Opcode ID: a1dcaf2c9422d01eb3780ba69a948f3d574b99c9199162d99782a2723591e002
                                                          • Instruction ID: 854555a5092e44083351888d56c691b0aa3e0f5c2020e938a2801eabe64e854e
                                                          • Opcode Fuzzy Hash: a1dcaf2c9422d01eb3780ba69a948f3d574b99c9199162d99782a2723591e002
                                                          • Instruction Fuzzy Hash: D9F0A431644B00BBC6226734AC0EF2E2759BBD17A1F25451CF825922E3EE2C98034561
                                                          APIs
                                                            • Part of subcall function 007A9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007A9693
                                                            • Part of subcall function 007A9639: SelectObject.GDI32(?,00000000), ref: 007A96A2
                                                            • Part of subcall function 007A9639: BeginPath.GDI32(?), ref: 007A96B9
                                                            • Part of subcall function 007A9639: SelectObject.GDI32(?,00000000), ref: 007A96E2
                                                          • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00828A4E
                                                          • LineTo.GDI32(?,00000003,00000000), ref: 00828A62
                                                          • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00828A70
                                                          • LineTo.GDI32(?,00000000,00000003), ref: 00828A80
                                                          • EndPath.GDI32(?), ref: 00828A90
                                                          • StrokePath.GDI32(?), ref: 00828AA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                          • String ID:
                                                          • API String ID: 43455801-0
                                                          • Opcode ID: b260ee719bba2864d8f0fc55fbf70cf1171daa70907fcc9a9f4957ce496796ca
                                                          • Instruction ID: d41d2083640043d4d9aa5d0cc4e95e995a38ae5b969e817e71e9ebab432e4439
                                                          • Opcode Fuzzy Hash: b260ee719bba2864d8f0fc55fbf70cf1171daa70907fcc9a9f4957ce496796ca
                                                          • Instruction Fuzzy Hash: AE11C976000519FFEF129F94DC88EAA7F6DFB08354F44C012FA199A1A1C771AD55DBA0
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 007F5218
                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 007F5229
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007F5230
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 007F5238
                                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 007F524F
                                                          • MulDiv.KERNEL32(000009EC,00000001,?), ref: 007F5261
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDevice$Release
                                                          • String ID:
                                                          • API String ID: 1035833867-0
                                                          • Opcode ID: 12b892369e2ace48aaa3596710a4d4e70217165c06e0a7790ad65571adc575c4
                                                          • Instruction ID: f086e889e3d86e37d1d6a52006c0ef72f4e2d239d347e1ee8298b047764a00ab
                                                          • Opcode Fuzzy Hash: 12b892369e2ace48aaa3596710a4d4e70217165c06e0a7790ad65571adc575c4
                                                          • Instruction Fuzzy Hash: 26014FB5E01718BBEB109BA69C49A6EBFB8FF48751F048165FB04A7281D6709801CBA0
                                                          APIs
                                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00791BF4
                                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00791BFC
                                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00791C07
                                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00791C12
                                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00791C1A
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00791C22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Virtual
                                                          • String ID:
                                                          • API String ID: 4278518827-0
                                                          • Opcode ID: 9149e8f847eff52908dc3358b520443df1455187f8a46ef7ca0191a37907dcaf
                                                          • Instruction ID: 1be778de117508baab5263b2d71e0f1d45c75d83651f19cba12828fa171b14a2
                                                          • Opcode Fuzzy Hash: 9149e8f847eff52908dc3358b520443df1455187f8a46ef7ca0191a37907dcaf
                                                          • Instruction Fuzzy Hash: 740167B0902B5ABDE3008F6A8C85B56FFA8FF19354F00411BA15C4BA42C7F5A864CBE5
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 007FEB30
                                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 007FEB46
                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 007FEB55
                                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007FEB64
                                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007FEB6E
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007FEB75
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 839392675-0
                                                          • Opcode ID: 2cad64ac1fdecc2c2ca4158ee8764fe14eb49147896a0d0ef56d37ecdbd6b3f7
                                                          • Instruction ID: 2b84a6624a29fd2e369ced00f521b322dcd558f5c16a44f6c0b0f12fb16de68c
                                                          • Opcode Fuzzy Hash: 2cad64ac1fdecc2c2ca4158ee8764fe14eb49147896a0d0ef56d37ecdbd6b3f7
                                                          • Instruction Fuzzy Hash: 11F03AB2240558BBE7315B629C0EEFF7A7CFFCAB11F008159FA01D1191D7A45A02C6B5
                                                          APIs
                                                          • GetClientRect.USER32(?), ref: 007E7452
                                                          • SendMessageW.USER32(?,00001328,00000000,?), ref: 007E7469
                                                          • GetWindowDC.USER32(?), ref: 007E7475
                                                          • GetPixel.GDI32(00000000,?,?), ref: 007E7484
                                                          • ReleaseDC.USER32(?,00000000), ref: 007E7496
                                                          • GetSysColor.USER32(00000005), ref: 007E74B0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                          • String ID:
                                                          • API String ID: 272304278-0
                                                          • Opcode ID: 34200a1043311d8cade3e5693a9fa187e9838313518a2782d554e64f46b91ab8
                                                          • Instruction ID: 64c526c1ffa642007d3a2df90df70fc590a1c1114771be94e34c57855bd2c398
                                                          • Opcode Fuzzy Hash: 34200a1043311d8cade3e5693a9fa187e9838313518a2782d554e64f46b91ab8
                                                          • Instruction Fuzzy Hash: 0C018631400245EFEB615FA4DC08BBE7BB5FF08321F218164FA16A21A1CB351E52EB50
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 007F187F
                                                          • UnloadUserProfile.USERENV(?,?), ref: 007F188B
                                                          • CloseHandle.KERNEL32(?), ref: 007F1894
                                                          • CloseHandle.KERNEL32(?), ref: 007F189C
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 007F18A5
                                                          • HeapFree.KERNEL32(00000000), ref: 007F18AC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                          • String ID:
                                                          • API String ID: 146765662-0
                                                          • Opcode ID: 96e23529206330947737aeebec012f3576c425a59a9c947b8eafa12ba8c03d4b
                                                          • Instruction ID: e405e0b0166289b14c9f1667ccca5de223b1688c86fb83042dfa426111eb5d58
                                                          • Opcode Fuzzy Hash: 96e23529206330947737aeebec012f3576c425a59a9c947b8eafa12ba8c03d4b
                                                          • Instruction Fuzzy Hash: 0CE0C236004501BBDA115BA5ED0D92ABB29FF49B22B20C620F22581174CB329432DB50
                                                          APIs
                                                            • Part of subcall function 007B0242: EnterCriticalSection.KERNEL32(0086070C,00861884,?,?,007A198B,00862518,?,?,?,007912F9,00000000), ref: 007B024D
                                                            • Part of subcall function 007B0242: LeaveCriticalSection.KERNEL32(0086070C,?,007A198B,00862518,?,?,?,007912F9,00000000), ref: 007B028A
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 007B00A3: __onexit.LIBCMT ref: 007B00A9
                                                          • __Init_thread_footer.LIBCMT ref: 00817BFB
                                                            • Part of subcall function 007B01F8: EnterCriticalSection.KERNEL32(0086070C,?,?,007A8747,00862514), ref: 007B0202
                                                            • Part of subcall function 007B01F8: LeaveCriticalSection.KERNEL32(0086070C,?,007A8747,00862514), ref: 007B0235
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                          • String ID: +T~$5$G$Variable must be of type 'Object'.
                                                          • API String ID: 535116098-1127575951
                                                          • Opcode ID: 51134b620e4231d2e699be088baf6ce02c3a9f7fbf183abd33a527aa4befcf51
                                                          • Instruction ID: 34349c538a3417a56446477b92af55ba1d29f83ef580f5cec416a090746d2335
                                                          • Opcode Fuzzy Hash: 51134b620e4231d2e699be088baf6ce02c3a9f7fbf183abd33a527aa4befcf51
                                                          • Instruction Fuzzy Hash: F3916B74A04209EFCB14EF98E8959EDB7B9FF49304F10805DF8069B291DB71AE85CB51
                                                          APIs
                                                            • Part of subcall function 00797620: _wcslen.LIBCMT ref: 00797625
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007FC6EE
                                                          • _wcslen.LIBCMT ref: 007FC735
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007FC79C
                                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 007FC7CA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info_wcslen$Default
                                                          • String ID: 0
                                                          • API String ID: 1227352736-4108050209
                                                          • Opcode ID: 2fe7236d56c62af2685be13f7d4572cb10ef8df2fab05573eb52d7fc5e14f139
                                                          • Instruction ID: 50506a40b95b7df4cb851818b8b67cf1cbacf5c1f22a33f76dde02e9e4c0d7da
                                                          • Opcode Fuzzy Hash: 2fe7236d56c62af2685be13f7d4572cb10ef8df2fab05573eb52d7fc5e14f139
                                                          • Instruction Fuzzy Hash: D351D47160830C9BD716AF28CA49B7B77E8AF85314F040A29F695D3391DB78D904DB62
                                                          APIs
                                                          • ShellExecuteExW.SHELL32(0000003C), ref: 0081AEA3
                                                            • Part of subcall function 00797620: _wcslen.LIBCMT ref: 00797625
                                                          • GetProcessId.KERNEL32(00000000), ref: 0081AF38
                                                          • CloseHandle.KERNEL32(00000000), ref: 0081AF67
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseExecuteHandleProcessShell_wcslen
                                                          • String ID: <$@
                                                          • API String ID: 146682121-1426351568
                                                          • Opcode ID: 981b2c414273e5bb40d453a68157a1373ea1335c47b3d8a8b4c3e4bdbe5826c4
                                                          • Instruction ID: 87364d25fad7cf3c8f3cf86fc592ab668cc412bbbcef7b2d76ebb2aa4f46a9f6
                                                          • Opcode Fuzzy Hash: 981b2c414273e5bb40d453a68157a1373ea1335c47b3d8a8b4c3e4bdbe5826c4
                                                          • Instruction Fuzzy Hash: 5A714775A00619DFCF18DF54D488A9EBBF4FF08314F048499E816AB292CB78ED85CB91
                                                          APIs
                                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 007F7206
                                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 007F723C
                                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 007F724D
                                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 007F72CF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                                          • String ID: DllGetClassObject
                                                          • API String ID: 753597075-1075368562
                                                          • Opcode ID: fa08f0f5d8f254e9f2d9cd9da1ade4154178f6b7019b7609928e6a60af06e335
                                                          • Instruction ID: 93593074482d87de4027c23ec90c9bdeb315638e7ac8e0975639b04c3e6ea642
                                                          • Opcode Fuzzy Hash: fa08f0f5d8f254e9f2d9cd9da1ade4154178f6b7019b7609928e6a60af06e335
                                                          • Instruction Fuzzy Hash: 7C415071604208EFDB19CF54C885AAA7BB9FF48310F1480ADBE059F30AD7B9D945DBA0
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00823E35
                                                          • IsMenu.USER32(?), ref: 00823E4A
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00823E92
                                                          • DrawMenuBar.USER32 ref: 00823EA5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$DrawInfoInsert
                                                          • String ID: 0
                                                          • API String ID: 3076010158-4108050209
                                                          • Opcode ID: 3750fb7753cbf24dc8b47739bd43ff2b6c31981672f12b0bdf8e4fc2e055a437
                                                          • Instruction ID: d55c8d1a47b00fd2991afd5e3b6711c16ad500ba22725e49c2c386ca9c3943bb
                                                          • Opcode Fuzzy Hash: 3750fb7753cbf24dc8b47739bd43ff2b6c31981672f12b0bdf8e4fc2e055a437
                                                          • Instruction Fuzzy Hash: 50416A79A01219EFDB10DF50E894AAABBB5FF48354F054029E905E7250D734EE89CF91
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 007F1E66
                                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 007F1E79
                                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 007F1EA9
                                                            • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_wcslen$ClassName
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 2081771294-1403004172
                                                          • Opcode ID: 7b7ed3b1d643c4714afb81a6c8883b0e881dfbcb182f4b6fcef2adc3bfb9d448
                                                          • Instruction ID: 559f1ec90550be6446529e8a99a002d8a736057f2985fa7820d1b4fb68c02fe9
                                                          • Opcode Fuzzy Hash: 7b7ed3b1d643c4714afb81a6c8883b0e881dfbcb182f4b6fcef2adc3bfb9d448
                                                          • Instruction Fuzzy Hash: 1821D371A00108EADB14ABA5DC59CFFB7B8EF56360F54451DFA25A72E1DB3C490AC620
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00822F8D
                                                          • LoadLibraryW.KERNEL32(?), ref: 00822F94
                                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00822FA9
                                                          • DestroyWindow.USER32(?), ref: 00822FB1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyLibraryLoadWindow
                                                          • String ID: SysAnimate32
                                                          • API String ID: 3529120543-1011021900
                                                          • Opcode ID: bf7adc087c6c3f0be5ce940531a7f7750252810655494f776100fdf2e9a45021
                                                          • Instruction ID: 18073cb6d3dd3e43675465eb5d39bbbce3c6a63d1cb4615b7d63754fb3981594
                                                          • Opcode Fuzzy Hash: bf7adc087c6c3f0be5ce940531a7f7750252810655494f776100fdf2e9a45021
                                                          • Instruction Fuzzy Hash: E621ACB2200229BBEF309F64ED84EBB37B9FB59364F104229FA50D2190DB71DC919760
                                                          APIs
                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,007B4D1E,007C28E9,?,007B4CBE,007C28E9,008588B8,0000000C,007B4E15,007C28E9,00000002), ref: 007B4D8D
                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 007B4DA0
                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,007B4D1E,007C28E9,?,007B4CBE,007C28E9,008588B8,0000000C,007B4E15,007C28E9,00000002,00000000), ref: 007B4DC3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                          • String ID: CorExitProcess$mscoree.dll
                                                          • API String ID: 4061214504-1276376045
                                                          • Opcode ID: 0d80d24c5a35c8818c527497b9a4f7b1b2613176958b157793cdcd87a8bfd88b
                                                          • Instruction ID: 9d4cb54ed74e6fc307e5edcf64e97458b29f77252d161bcf3ad24038c5dffffd
                                                          • Opcode Fuzzy Hash: 0d80d24c5a35c8818c527497b9a4f7b1b2613176958b157793cdcd87a8bfd88b
                                                          • Instruction Fuzzy Hash: 8EF04F34A40208BBDB619F90DC49BEEBBB5FF44752F0040A4F905A22A1CB795951CED0
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00794EDD,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E9C
                                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00794EAE
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00794EDD,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794EC0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                          • API String ID: 145871493-3689287502
                                                          • Opcode ID: a7fccc074f241322507586879371c02f9b065c35875e09e033597baf7afdf170
                                                          • Instruction ID: ee1acf3151fa4006b4d5e0e06500080882bb26d853075f66335b0f86881fef63
                                                          • Opcode Fuzzy Hash: a7fccc074f241322507586879371c02f9b065c35875e09e033597baf7afdf170
                                                          • Instruction Fuzzy Hash: 26E08C36A02A22AB96321B25BC1AE7F7658BF81BA3B054125FC01E2200DB68CD0380E0
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,007D3CDE,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E62
                                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00794E74
                                                          • FreeLibrary.KERNEL32(00000000,?,?,007D3CDE,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E87
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                          • API String ID: 145871493-1355242751
                                                          • Opcode ID: 24dc1eaec7a7144f35f57272116b6d55987e75c1f51ad3209a9651b16b738ae9
                                                          • Instruction ID: 6acdf6ab29245bd8aa0d82a64eed505104305f8e839b5cc0a183f8f228cf4478
                                                          • Opcode Fuzzy Hash: 24dc1eaec7a7144f35f57272116b6d55987e75c1f51ad3209a9651b16b738ae9
                                                          • Instruction Fuzzy Hash: E0D0C232902A31574A321B247C09DAF3A18FF85B613054110BC00E2310CF28CD13C1D0
                                                          APIs
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00802C05
                                                          • DeleteFileW.KERNEL32(?), ref: 00802C87
                                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00802C9D
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00802CAE
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00802CC0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: File$Delete$Copy
                                                          • String ID:
                                                          • API String ID: 3226157194-0
                                                          • Opcode ID: 1c969ec67f6275ae9483f28658f9b7983a1d131d201a253bb89eabfce8364a88
                                                          • Instruction ID: eb4f17b09afc4d5350cf74a1c9c61dff4f77ad6c54530ffce62ae28616c55fc5
                                                          • Opcode Fuzzy Hash: 1c969ec67f6275ae9483f28658f9b7983a1d131d201a253bb89eabfce8364a88
                                                          • Instruction Fuzzy Hash: 32B16071D00129EBDF61DBA4CC89EDEB77DFF48350F1040A6FA09E6191EA749A448F61
                                                          APIs
                                                          • GetCurrentProcessId.KERNEL32 ref: 0081A427
                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0081A435
                                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0081A468
                                                          • CloseHandle.KERNEL32(?), ref: 0081A63D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseCountersCurrentHandleOpen
                                                          • String ID:
                                                          • API String ID: 3488606520-0
                                                          • Opcode ID: a44294991d50a581645082260ad569cee07036f6cb7b27908279658a5e44286b
                                                          • Instruction ID: fd8f3eef3f8b01634878083ae97a8859cda97d34094f9e8ac505443b9be90157
                                                          • Opcode Fuzzy Hash: a44294991d50a581645082260ad569cee07036f6cb7b27908279658a5e44286b
                                                          • Instruction Fuzzy Hash: 23A1AF726043009FDB24DF24D88AB6AB7E5FF88714F14881DF55ADB292D7B4EC418B92
                                                          APIs
                                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00833700), ref: 007CBB91
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0086121C,000000FF,00000000,0000003F,00000000,?,?), ref: 007CBC09
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00861270,000000FF,?,0000003F,00000000,?), ref: 007CBC36
                                                          • _free.LIBCMT ref: 007CBB7F
                                                            • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                            • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                          • _free.LIBCMT ref: 007CBD4B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                          • String ID:
                                                          • API String ID: 1286116820-0
                                                          • Opcode ID: b66c7e117b2bb5d40a607535a96d5acdb84472d531d12a7ce96bcb846894c069
                                                          • Instruction ID: 342bb3ba91df9d9b8e1b25479f922d90939ff7d36435bac56c422ad2c51cc873
                                                          • Opcode Fuzzy Hash: b66c7e117b2bb5d40a607535a96d5acdb84472d531d12a7ce96bcb846894c069
                                                          • Instruction Fuzzy Hash: DB51C671900209EFCB20DF659C8AEAEB7B8FB40350F15426EF554E7291EB789D418BA0
                                                          APIs
                                                            • Part of subcall function 007FDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007FCF22,?), ref: 007FDDFD
                                                            • Part of subcall function 007FDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007FCF22,?), ref: 007FDE16
                                                            • Part of subcall function 007FE199: GetFileAttributesW.KERNEL32(?,007FCF95), ref: 007FE19A
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 007FE473
                                                          • MoveFileW.KERNEL32(?,?), ref: 007FE4AC
                                                          • _wcslen.LIBCMT ref: 007FE5EB
                                                          • _wcslen.LIBCMT ref: 007FE603
                                                          • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 007FE650
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                          • String ID:
                                                          • API String ID: 3183298772-0
                                                          • Opcode ID: 6041e571ad4fdd0338f67522ebec08bd8f03731f6d6d6469619ce6537a0e9971
                                                          • Instruction ID: d6b704732540cc3a0d89cb3f2006f6ce2559af6a7e73ea30863d66092f642fa2
                                                          • Opcode Fuzzy Hash: 6041e571ad4fdd0338f67522ebec08bd8f03731f6d6d6469619ce6537a0e9971
                                                          • Instruction Fuzzy Hash: FC5154B24083899BD724EB94DC859EFB3DCAF85340F00491EF789D3251EF78A5888766
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 0081C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0081B6AE,?,?), ref: 0081C9B5
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081C9F1
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA68
                                                            • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0081BAA5
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0081BB00
                                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0081BB63
                                                          • RegCloseKey.ADVAPI32(?,?), ref: 0081BBA6
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 0081BBB3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                          • String ID:
                                                          • API String ID: 826366716-0
                                                          • Opcode ID: ae04a94f7d8f5bbb1468541db2dcbbf382474407c9fb1a9c1f138320b0db6291
                                                          • Instruction ID: 8236acd5c0f446657fd403e85cda59146bf696b18340349892a685deb6e42306
                                                          • Opcode Fuzzy Hash: ae04a94f7d8f5bbb1468541db2dcbbf382474407c9fb1a9c1f138320b0db6291
                                                          • Instruction Fuzzy Hash: 6961D371208241EFD714DF24C894E6ABBE9FF84318F14855CF4998B2A2DB31ED85CB92
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 007F8BCD
                                                          • VariantClear.OLEAUT32 ref: 007F8C3E
                                                          • VariantClear.OLEAUT32 ref: 007F8C9D
                                                          • VariantClear.OLEAUT32(?), ref: 007F8D10
                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 007F8D3B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$ChangeInitType
                                                          • String ID:
                                                          • API String ID: 4136290138-0
                                                          • Opcode ID: d3485548eb5c828f3a61d94e67bbc790e3143f42e289ee00db9dfca2e9d76315
                                                          • Instruction ID: 68d8ef60a2c602ea55840534dc9844bd2d10e30c964f0411f75ac9c99ea7e672
                                                          • Opcode Fuzzy Hash: d3485548eb5c828f3a61d94e67bbc790e3143f42e289ee00db9dfca2e9d76315
                                                          • Instruction Fuzzy Hash: 165169B5A00619EFCB10CF68C884AAAB7F8FF8D310B158559EA15DB354E734E911CFA0
                                                          APIs
                                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00808BAE
                                                          • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00808BDA
                                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00808C32
                                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00808C57
                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00808C5F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfile$SectionWrite$String
                                                          • String ID:
                                                          • API String ID: 2832842796-0
                                                          • Opcode ID: 2888dbd269c010017ebdc1343326c77bb9a4b2c9a9c7dafca5101ee65a88a4c1
                                                          • Instruction ID: 9693068e23556ded42deb05fe26731d2be5693ce659d8b0bd00e6de84b7a279e
                                                          • Opcode Fuzzy Hash: 2888dbd269c010017ebdc1343326c77bb9a4b2c9a9c7dafca5101ee65a88a4c1
                                                          • Instruction Fuzzy Hash: AB513735A00214DFDF55DF64C885A69BBF5FF49314F088058E849AB3A2DB35ED51CB90
                                                          APIs
                                                          • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00818F40
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00818FD0
                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00818FEC
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00819032
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00819052
                                                            • Part of subcall function 007AF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00801043,?,7529E610), ref: 007AF6E6
                                                            • Part of subcall function 007AF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,007EFA64,00000000,00000000,?,?,00801043,?,7529E610,?,007EFA64), ref: 007AF70D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                          • String ID:
                                                          • API String ID: 666041331-0
                                                          • Opcode ID: 87eae1263eb5552c36db9b3a499c12e96a0d769752af81df796f57d6662b2fc4
                                                          • Instruction ID: 50c67ea88bc73ac51b1f0e23c8e1a8414c8b4ce85f843cdffdb2a59aa8a7526b
                                                          • Opcode Fuzzy Hash: 87eae1263eb5552c36db9b3a499c12e96a0d769752af81df796f57d6662b2fc4
                                                          • Instruction Fuzzy Hash: F3515934A04605DFCB14DF58D499CADBBF5FF49314B0580A8E84A9B362DB31ED86CB90
                                                          APIs
                                                          • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00826C33
                                                          • SetWindowLongW.USER32(?,000000EC,?), ref: 00826C4A
                                                          • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00826C73
                                                          • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0080AB79,00000000,00000000), ref: 00826C98
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00826CC7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$MessageSendShow
                                                          • String ID:
                                                          • API String ID: 3688381893-0
                                                          • Opcode ID: 7ccbfa097336b8152a9c2ecee0ceb979121e77d98bf3d5220596e71f8aadb72e
                                                          • Instruction ID: 2cf9ad673e5114b4f9ac8947e378deb605d71bb8fd8ae1b0804950d002100811
                                                          • Opcode Fuzzy Hash: 7ccbfa097336b8152a9c2ecee0ceb979121e77d98bf3d5220596e71f8aadb72e
                                                          • Instruction Fuzzy Hash: 5941E735604124AFDB24EF28DC59FB97BA5FB09360F150268F895E72E0E371EDA1CA40
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: d3d64efe4f7699ae8381035221b87cfaba04fdef363549442306e16ce46043c0
                                                          • Instruction ID: f72d02d356192d33150cee8e2916de621427d8145a17f52c3ac96bac89144724
                                                          • Opcode Fuzzy Hash: d3d64efe4f7699ae8381035221b87cfaba04fdef363549442306e16ce46043c0
                                                          • Instruction Fuzzy Hash: 1D41BE32A00204DFCB24DF78C885F5AB7A5EF89314B1545ADE615EB392DA35AD02CB80
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 007A9141
                                                          • ScreenToClient.USER32(00000000,?), ref: 007A915E
                                                          • GetAsyncKeyState.USER32(00000001), ref: 007A9183
                                                          • GetAsyncKeyState.USER32(00000002), ref: 007A919D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: AsyncState$ClientCursorScreen
                                                          • String ID:
                                                          • API String ID: 4210589936-0
                                                          • Opcode ID: 27f9a65564f69947416c27b629270a8797cf669a10bd085250a3fa7b10cb158c
                                                          • Instruction ID: b03986f67c07b328cd0d2e7f27110c31a282a2f7f7ce54e02fe6fc50b9f18b6d
                                                          • Opcode Fuzzy Hash: 27f9a65564f69947416c27b629270a8797cf669a10bd085250a3fa7b10cb158c
                                                          • Instruction Fuzzy Hash: 5C415E3190865AFBDF199F69C848BEEB775FF4A320F208315E525A7290C7385950CB51
                                                          APIs
                                                          • GetInputState.USER32 ref: 008038CB
                                                          • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00803922
                                                          • TranslateMessage.USER32(?), ref: 0080394B
                                                          • DispatchMessageW.USER32(?), ref: 00803955
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00803966
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                          • String ID:
                                                          • API String ID: 2256411358-0
                                                          • Opcode ID: 36052af2587f9b8f51d252f112141d2fd34735dd0dec32780f74275b1e7a0105
                                                          • Instruction ID: 85d3973068ac30a546bef2461c2eb647f4121ee5b269fd9392a8d8133c261292
                                                          • Opcode Fuzzy Hash: 36052af2587f9b8f51d252f112141d2fd34735dd0dec32780f74275b1e7a0105
                                                          • Instruction Fuzzy Hash: 4E31CE709043469EEF758B349D09BB67BACFB02304F094569E462C22E1E3E49A85CB21
                                                          APIs
                                                          • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0080C21E,00000000), ref: 0080CF38
                                                          • InternetReadFile.WININET(?,00000000,?,?), ref: 0080CF6F
                                                          • GetLastError.KERNEL32(?,00000000,?,?,?,0080C21E,00000000), ref: 0080CFB4
                                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,0080C21E,00000000), ref: 0080CFC8
                                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,0080C21E,00000000), ref: 0080CFF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                          • String ID:
                                                          • API String ID: 3191363074-0
                                                          • Opcode ID: 92064990dd89195c5f33ec27593bd595f62d2e6de0ff3e563a30df0b143d8eaa
                                                          • Instruction ID: e59d625afeff1c7448b04bf7b60fe3b49bca9c32317ecac5600df0db6cfe5e3b
                                                          • Opcode Fuzzy Hash: 92064990dd89195c5f33ec27593bd595f62d2e6de0ff3e563a30df0b143d8eaa
                                                          • Instruction Fuzzy Hash: 1E317C71600206EFDB60DFA5CC849AFBBF9FF04354B10852EF506D2180DB70AE419BA1
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 007F1915
                                                          • PostMessageW.USER32(00000001,00000201,00000001), ref: 007F19C1
                                                          • Sleep.KERNEL32(00000000,?,?,?), ref: 007F19C9
                                                          • PostMessageW.USER32(00000001,00000202,00000000), ref: 007F19DA
                                                          • Sleep.KERNEL32(00000000,?,?,?,?), ref: 007F19E2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleep$RectWindow
                                                          • String ID:
                                                          • API String ID: 3382505437-0
                                                          • Opcode ID: 05726b97f0b4dd57cbdb00cef2f193a99e6ecc5eb2a63b12b28128c4ca2a4331
                                                          • Instruction ID: 67303d20ee03eac4c68fdb44a30a179acaa6986cd76e965952f60e1cfdea8341
                                                          • Opcode Fuzzy Hash: 05726b97f0b4dd57cbdb00cef2f193a99e6ecc5eb2a63b12b28128c4ca2a4331
                                                          • Instruction Fuzzy Hash: 0231E27190025DEFCB14CFA8CD99AEE3BB5FB04314F408229FA21A72D0C3B4A954DB90
                                                          APIs
                                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00825745
                                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 0082579D
                                                          • _wcslen.LIBCMT ref: 008257AF
                                                          • _wcslen.LIBCMT ref: 008257BA
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00825816
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_wcslen
                                                          • String ID:
                                                          • API String ID: 763830540-0
                                                          • Opcode ID: 2b7ec1c8682f90b2b5548bc132cb8283087fe7ff748e5ae5f7dee8b4ba6d4750
                                                          • Instruction ID: 2c9fb4cafe48b8b750e9ad79a6becf905c19bef0239417ed5f4bb014ac6c705a
                                                          • Opcode Fuzzy Hash: 2b7ec1c8682f90b2b5548bc132cb8283087fe7ff748e5ae5f7dee8b4ba6d4750
                                                          • Instruction Fuzzy Hash: B821B671944628DADB209F64EC84AEEBBB8FF14324F108216F929EB181D770D9C5CF50
                                                          APIs
                                                          • IsWindow.USER32(00000000), ref: 00810951
                                                          • GetForegroundWindow.USER32 ref: 00810968
                                                          • GetDC.USER32(00000000), ref: 008109A4
                                                          • GetPixel.GDI32(00000000,?,00000003), ref: 008109B0
                                                          • ReleaseDC.USER32(00000000,00000003), ref: 008109E8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ForegroundPixelRelease
                                                          • String ID:
                                                          • API String ID: 4156661090-0
                                                          • Opcode ID: 735977ddd6f40616cddae769de703497b57c5fddfd8843a2977c1e7d3b40c059
                                                          • Instruction ID: 62b1ffc71d99cc402b4192dfd07628f5839947fe8e94332bd0d4c7c331be9ecd
                                                          • Opcode Fuzzy Hash: 735977ddd6f40616cddae769de703497b57c5fddfd8843a2977c1e7d3b40c059
                                                          • Instruction Fuzzy Hash: B5218335A00104AFDB14EF68DC88AAEBBE9FF44700F048028E846D7751CA70AC44CB50
                                                          APIs
                                                          • GetEnvironmentStringsW.KERNEL32 ref: 007CCDC6
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 007CCDE9
                                                            • Part of subcall function 007C3820: RtlAllocateHeap.NTDLL(00000000,?,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6,?,00791129), ref: 007C3852
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 007CCE0F
                                                          • _free.LIBCMT ref: 007CCE22
                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 007CCE31
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                          • String ID:
                                                          • API String ID: 336800556-0
                                                          • Opcode ID: 5704475686703c9a61cc6ef99b6b4e19664ba173bb37eec3489da431b93dd642
                                                          • Instruction ID: 2cc812852d1a3dfd2522334151d62c93b5f6d290f7fdc0138effde8837074abc
                                                          • Opcode Fuzzy Hash: 5704475686703c9a61cc6ef99b6b4e19664ba173bb37eec3489da431b93dd642
                                                          • Instruction Fuzzy Hash: 5201A7726016157F23325AB66C8DE7F7B6DEEC7BA1315412DFD09D7201EA698D0281F0
                                                          APIs
                                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007A9693
                                                          • SelectObject.GDI32(?,00000000), ref: 007A96A2
                                                          • BeginPath.GDI32(?), ref: 007A96B9
                                                          • SelectObject.GDI32(?,00000000), ref: 007A96E2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: f17444bba2bdb0754e6a3131fd4b83fffc438f1101e199d4d45a98d0d2a5330a
                                                          • Instruction ID: 4b92ee2fc058a9caa119e4128dddc23048fa2587ad454f947103b362d2154c0d
                                                          • Opcode Fuzzy Hash: f17444bba2bdb0754e6a3131fd4b83fffc438f1101e199d4d45a98d0d2a5330a
                                                          • Instruction Fuzzy Hash: 99217F30802305EBEF119F64DC19BA93FA8BF81315F594316FA10A61A2D3B958A2CF94
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 1661d0ac43b459ebedf49679cca0c7ba2c0f0d40e6fc18691c372dd43f714afa
                                                          • Instruction ID: 7a3f9b5a0537414ffd953ea22e38172ff7d6ec28caa7ef21c44c9d84db6f006e
                                                          • Opcode Fuzzy Hash: 1661d0ac43b459ebedf49679cca0c7ba2c0f0d40e6fc18691c372dd43f714afa
                                                          • Instruction Fuzzy Hash: 8C019262645A1DFAD6086511ED92FFB639CEB213A4B804030FF15DB342F66CED50D2B0
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,?,007BF2DE,007C3863,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6), ref: 007C2DFD
                                                          • _free.LIBCMT ref: 007C2E32
                                                          • _free.LIBCMT ref: 007C2E59
                                                          • SetLastError.KERNEL32(00000000,00791129), ref: 007C2E66
                                                          • SetLastError.KERNEL32(00000000,00791129), ref: 007C2E6F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free
                                                          • String ID:
                                                          • API String ID: 3170660625-0
                                                          • Opcode ID: 4730a53811bba9081a0334de8434f323c0bb68528e26417d324a6b6681ec6264
                                                          • Instruction ID: b24450939e7497a007849b57a2301b3c51027cff1d81f9372c60ed55cf2c22f4
                                                          • Opcode Fuzzy Hash: 4730a53811bba9081a0334de8434f323c0bb68528e26417d324a6b6681ec6264
                                                          • Instruction Fuzzy Hash: 0D01A436245A00BBDA2267756C4DF2F276DBBD17B5B25852CF425B22A3EB7C8C074520
                                                          APIs
                                                          • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?,?,007F035E), ref: 007F002B
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?), ref: 007F0046
                                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?), ref: 007F0054
                                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?), ref: 007F0064
                                                          • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?), ref: 007F0070
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                                          • String ID:
                                                          • API String ID: 3897988419-0
                                                          • Opcode ID: 46deaa3cc3df0469bb4467c5c8212f8d0f28ffd5fb7e09edb39e1c955c485f34
                                                          • Instruction ID: a2125aeb44c5a73a12cd19613db96e2d1be9e979f033a37e0da623719bead479
                                                          • Opcode Fuzzy Hash: 46deaa3cc3df0469bb4467c5c8212f8d0f28ffd5fb7e09edb39e1c955c485f34
                                                          • Instruction Fuzzy Hash: 98017C76600208BBDB204F68DC08BBE7AADEB44751F148124FA05D2311DB79DD419BA0
                                                          APIs
                                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007F1114
                                                          • GetLastError.KERNEL32(?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1120
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F112F
                                                          • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1136
                                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007F114D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 842720411-0
                                                          • Opcode ID: f7ed2c4ef79d0f1e9ce299aa7fd58b91059d93cca6758d72211be63cc343e204
                                                          • Instruction ID: 0be5c77d4da5a67cdadf061c86483f7c9ee0a92a20ec14aa5c9ac1eeb412f6b7
                                                          • Opcode Fuzzy Hash: f7ed2c4ef79d0f1e9ce299aa7fd58b91059d93cca6758d72211be63cc343e204
                                                          • Instruction Fuzzy Hash: FC011D79500209BFDB214F69DC59A7A3B6EFF85360B504419FA45D7350DB31DC119A60
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007F0FCA
                                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007F0FD6
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 007F0FE5
                                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 007F0FEC
                                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 007F1002
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 88569ed107ca7f632d8ea862c8ba92bae19e5760b129ce3e7e28f7d65d62526c
                                                          • Instruction ID: 69b44ef0a7a571a7fc72ada32ea40bbec05366971963ae4d8445d356cff19a5e
                                                          • Opcode Fuzzy Hash: 88569ed107ca7f632d8ea862c8ba92bae19e5760b129ce3e7e28f7d65d62526c
                                                          • Instruction Fuzzy Hash: 39F04936200305FBDB214FA49C4EF6A3BADFF89762F608424FA45C7251CA74DC518A60
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 007F102A
                                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 007F1036
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007F1045
                                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 007F104C
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007F1062
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 5bdd5e8bd943815a6fc7b828805fe51f2cbaf96bd2e9418f5700a3a707b05b41
                                                          • Instruction ID: 0fc5f04ed6cf184179832a18ab3e460f8ad1034529d685f4d2114bfe70f531ef
                                                          • Opcode Fuzzy Hash: 5bdd5e8bd943815a6fc7b828805fe51f2cbaf96bd2e9418f5700a3a707b05b41
                                                          • Instruction Fuzzy Hash: 01F06D35200305FBDB215FA4EC49F6A3BADFF89761F604424FA45C7350CE74D8518A60
                                                          APIs
                                                          • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 00800324
                                                          • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 00800331
                                                          • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 0080033E
                                                          • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 0080034B
                                                          • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 00800358
                                                          • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 00800365
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle
                                                          • String ID:
                                                          • API String ID: 2962429428-0
                                                          • Opcode ID: 6ddeb4abe3a7f510ec182948386d72c76a4c5942bd6580ae759f35ccdbd35b44
                                                          • Instruction ID: a61701e7636aa8e519d3846c5d9b84deba097dc8f129879f94aec0c56ce1e71b
                                                          • Opcode Fuzzy Hash: 6ddeb4abe3a7f510ec182948386d72c76a4c5942bd6580ae759f35ccdbd35b44
                                                          • Instruction Fuzzy Hash: 4F019C72800B159FCB31AF66DC80916FBF9FE603157168A3ED19692A71C3B1A959CE80
                                                          APIs
                                                          • _free.LIBCMT ref: 007CD752
                                                            • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                            • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                          • _free.LIBCMT ref: 007CD764
                                                          • _free.LIBCMT ref: 007CD776
                                                          • _free.LIBCMT ref: 007CD788
                                                          • _free.LIBCMT ref: 007CD79A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 72cf81d91b0058771a90c69f1d9e3dd0c6307af2be4e458501e50a4a14c28a98
                                                          • Instruction ID: ea7f4c04a37592d4226da17255a5915d059589eccacc158cae59a5babb6eb6d3
                                                          • Opcode Fuzzy Hash: 72cf81d91b0058771a90c69f1d9e3dd0c6307af2be4e458501e50a4a14c28a98
                                                          • Instruction Fuzzy Hash: DEF01D72544304AF8631EB68F9CAE1A7BDDBB44711BA5082DF049E7512CB3CFC818E64
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 007F5C58
                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 007F5C6F
                                                          • MessageBeep.USER32(00000000), ref: 007F5C87
                                                          • KillTimer.USER32(?,0000040A), ref: 007F5CA3
                                                          • EndDialog.USER32(?,00000001), ref: 007F5CBD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                          • String ID:
                                                          • API String ID: 3741023627-0
                                                          • Opcode ID: fde09eebbfa4d5e5ba9167c6e2d5ee3679806079e3c2b4966fe6e36d1cf5cda6
                                                          • Instruction ID: f723b69c290a4284f45c7ecb2836ba5cfb8aca0b7466e9ea9d702540ab6a6e24
                                                          • Opcode Fuzzy Hash: fde09eebbfa4d5e5ba9167c6e2d5ee3679806079e3c2b4966fe6e36d1cf5cda6
                                                          • Instruction Fuzzy Hash: D8018670500B09ABEB305B50DD4EFBA77B8BF10B05F00555DA783A15E1DBF4A985CAA0
                                                          APIs
                                                          • _free.LIBCMT ref: 007C22BE
                                                            • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                            • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                          • _free.LIBCMT ref: 007C22D0
                                                          • _free.LIBCMT ref: 007C22E3
                                                          • _free.LIBCMT ref: 007C22F4
                                                          • _free.LIBCMT ref: 007C2305
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 8fb8695df2cdb82e55b22c91d0c68cef932115d2a04c8aa4ad5a02e464972b85
                                                          • Instruction ID: cccf5b1b0fa6628047e221acafad41eea2aebd12de54f9c0f0ecbb7f14d0538d
                                                          • Opcode Fuzzy Hash: 8fb8695df2cdb82e55b22c91d0c68cef932115d2a04c8aa4ad5a02e464972b85
                                                          • Instruction Fuzzy Hash: 30F03A708402209F8A12AF54BC09E093FA4F718761706251EF414E23B7CBB81912EFA8
                                                          APIs
                                                          • EndPath.GDI32(?), ref: 007A95D4
                                                          • StrokeAndFillPath.GDI32(?,?,007E71F7,00000000,?,?,?), ref: 007A95F0
                                                          • SelectObject.GDI32(?,00000000), ref: 007A9603
                                                          • DeleteObject.GDI32 ref: 007A9616
                                                          • StrokePath.GDI32(?), ref: 007A9631
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                                          • String ID:
                                                          • API String ID: 2625713937-0
                                                          • Opcode ID: c9bdfc99aeb837660bba4d23f1c151308243ebefad88b7691e80d985d2eb0f0b
                                                          • Instruction ID: e1d987cc094bc0c056b66cd8d03ad7f3f0b339c8d9227ac3e6db3af753f9160c
                                                          • Opcode Fuzzy Hash: c9bdfc99aeb837660bba4d23f1c151308243ebefad88b7691e80d985d2eb0f0b
                                                          • Instruction Fuzzy Hash: ACF08C31405604EBEF264F24EC1CBB83F64BB42322F488314F525550F2C7B489A2DFA0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: __freea$_free
                                                          • String ID: a/p$am/pm
                                                          • API String ID: 3432400110-3206640213
                                                          • Opcode ID: aa914d624e76d312fec7568a829ad12c9ef09ca26ebbb0c9498af83cbf74a263
                                                          • Instruction ID: 1809bfa23de52f882b40e9b08f9f5ac67f05e28728775a4a2bbdcff6c0b88da9
                                                          • Opcode Fuzzy Hash: aa914d624e76d312fec7568a829ad12c9ef09ca26ebbb0c9498af83cbf74a263
                                                          • Instruction Fuzzy Hash: 8CD1CF35A00286CADB249F68C855FBAB7B1FF07704FA8417DE901AB652D37D9D80CB91
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: JOy
                                                          • API String ID: 0-3698608982
                                                          • Opcode ID: 0972b9cafb84f2ad0ddb761f7eaba0a4751c35cf2d8699f6cdaf8e02d1a5578a
                                                          • Instruction ID: 2ab4f409f9433661c07d3e64e2b649d512ba2028e6a8a0258fab52e664a56e56
                                                          • Opcode Fuzzy Hash: 0972b9cafb84f2ad0ddb761f7eaba0a4751c35cf2d8699f6cdaf8e02d1a5578a
                                                          • Instruction Fuzzy Hash: 785190B590060AEFCB219FA4CD49FEE7FB4EF05310F14015EF405A7292D67AA9818B61
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 007C8B6E
                                                          • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 007C8B7A
                                                          • __dosmaperr.LIBCMT ref: 007C8B81
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                          • String ID: .{
                                                          • API String ID: 2434981716-1852962426
                                                          • Opcode ID: c6505a41c7eb48f080900e3ff6e93ed416fd2d8f3d939479bce011d3b48b98aa
                                                          • Instruction ID: f331ee36d80cf53ca6fdbd9faa851b22a7e23bfae06fe63449520c64917b4dcc
                                                          • Opcode Fuzzy Hash: c6505a41c7eb48f080900e3ff6e93ed416fd2d8f3d939479bce011d3b48b98aa
                                                          • Instruction Fuzzy Hash: 32419DF0604145AFDB649F24CC85FBD7FA5EB85300F2881AEF89587242DE39CC028B95
                                                          APIs
                                                            • Part of subcall function 007FB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007F21D0,?,?,00000034,00000800,?,00000034), ref: 007FB42D
                                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 007F2760
                                                            • Part of subcall function 007FB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007F21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 007FB3F8
                                                            • Part of subcall function 007FB32A: GetWindowThreadProcessId.USER32(?,?), ref: 007FB355
                                                            • Part of subcall function 007FB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,007F2194,00000034,?,?,00001004,00000000,00000000), ref: 007FB365
                                                            • Part of subcall function 007FB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,007F2194,00000034,?,?,00001004,00000000,00000000), ref: 007FB37B
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007F27CD
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007F281A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                          • String ID: @
                                                          • API String ID: 4150878124-2766056989
                                                          • Opcode ID: 83876530c14217259200c6356314229801266c6eaebeeb8207d2c0ee7999f5e4
                                                          • Instruction ID: da626f5285d071faa05103576e1db59013f59330e4f83930e1b19990f3c9f7df
                                                          • Opcode Fuzzy Hash: 83876530c14217259200c6356314229801266c6eaebeeb8207d2c0ee7999f5e4
                                                          • Instruction Fuzzy Hash: 81412E7290021CAFDB10DFA4CD46AEEBBB8EF09740F104059FA55B7281DB746E45CBA1
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 007C1769
                                                          • _free.LIBCMT ref: 007C1834
                                                          • _free.LIBCMT ref: 007C183E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$FileModuleName
                                                          • String ID: C:\Users\user\Desktop\file.exe
                                                          • API String ID: 2506810119-517116171
                                                          • Opcode ID: d4130ea71228e495bbe4b506abaa3646b594467d540498015dc22afedc9916ca
                                                          • Instruction ID: 0e3a1dc7ed5f80b08c94ef5ad30b9528731a34359b87e552975426576fd8fe94
                                                          • Opcode Fuzzy Hash: d4130ea71228e495bbe4b506abaa3646b594467d540498015dc22afedc9916ca
                                                          • Instruction Fuzzy Hash: 5E318475A44218EFDB21DF999C89E9EBBFCEB86310B54417EF404D7212D6B48E40CB90
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 007FC306
                                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 007FC34C
                                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00861990,012058E8), ref: 007FC395
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Delete$InfoItem
                                                          • String ID: 0
                                                          • API String ID: 135850232-4108050209
                                                          • Opcode ID: b399d9a14f4d4f95238d3e42f8a747209db5bd2befb580ccd54542ce310fa2f7
                                                          • Instruction ID: 6dc4d9f0f2bfba50dc6ba8fa89b21e0c941a270a988c067b9272b8554039072c
                                                          • Opcode Fuzzy Hash: b399d9a14f4d4f95238d3e42f8a747209db5bd2befb580ccd54542ce310fa2f7
                                                          • Instruction Fuzzy Hash: 4D418C312043099FD721DF29D985B6ABBE4BF85360F108A1DFAA5973D1D738E904CB52
                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0082CC08,00000000,?,?,?,?), ref: 008244AA
                                                          • GetWindowLongW.USER32 ref: 008244C7
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 008244D7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID: SysTreeView32
                                                          • API String ID: 847901565-1698111956
                                                          • Opcode ID: 7c1505699b794451a3ec026a9bc7ee3c6cff2cd2a59cc93454e2f77cfc191718
                                                          • Instruction ID: 28b2117036ceb1d3c1b52b10cca20da895430fa480b57b39056ff406b64efd92
                                                          • Opcode Fuzzy Hash: 7c1505699b794451a3ec026a9bc7ee3c6cff2cd2a59cc93454e2f77cfc191718
                                                          • Instruction Fuzzy Hash: 3A319C71201215ABDF209E38EC45BEA7BA9FB08324F205315F975E21D0D774EC919B60
                                                          APIs
                                                            • Part of subcall function 0081335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00813077,?,?), ref: 00813378
                                                          • inet_addr.WSOCK32(?), ref: 0081307A
                                                          • _wcslen.LIBCMT ref: 0081309B
                                                          • htons.WSOCK32(00000000), ref: 00813106
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                          • String ID: 255.255.255.255
                                                          • API String ID: 946324512-2422070025
                                                          • Opcode ID: 6c500273897354b689946db32a85f020d1bcaba9aa95a287f11f8526255de2db
                                                          • Instruction ID: df30ddab7b2fb1622f722f5d30d3fa3e52f0596b13bde341db7922644507000e
                                                          • Opcode Fuzzy Hash: 6c500273897354b689946db32a85f020d1bcaba9aa95a287f11f8526255de2db
                                                          • Instruction Fuzzy Hash: D631A1356002059FDB20CF68C485EA977E8FF18318F248099E915DB392DB71EE85C760
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00823F40
                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00823F54
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00823F78
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window
                                                          • String ID: SysMonthCal32
                                                          • API String ID: 2326795674-1439706946
                                                          • Opcode ID: 7beb1e4188354348551c1268b3c79cb2c83a8751ce720f2388f12ecb12914219
                                                          • Instruction ID: eed551f5131fc66b1a91a063a7e807f437a2708b6ff4fdc0c3e264c2b1269b47
                                                          • Opcode Fuzzy Hash: 7beb1e4188354348551c1268b3c79cb2c83a8751ce720f2388f12ecb12914219
                                                          • Instruction Fuzzy Hash: 5521BF32600229BBDF218F54EC46FEA3B75FF48724F110214FA15AB1D0DAB9AC95CB90
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00824705
                                                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00824713
                                                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0082471A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyWindow
                                                          • String ID: msctls_updown32
                                                          • API String ID: 4014797782-2298589950
                                                          • Opcode ID: 24da2b54aec8d86986d12bda77129c6e2a199aa1ce7656294be2287c66e863df
                                                          • Instruction ID: 99923f0b74b92273343e68074b1eac92e89b9e6e19255b7e75186c8cb9db2c05
                                                          • Opcode Fuzzy Hash: 24da2b54aec8d86986d12bda77129c6e2a199aa1ce7656294be2287c66e863df
                                                          • Instruction Fuzzy Hash: A5217CB5600218AFEB10DF68EC85DBA37ADFB5A394B041059FA11DB251CB70EC51CA60
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                          • API String ID: 176396367-2734436370
                                                          • Opcode ID: 4a0ba059b0978cefd4cbb373a6146f36c23a603f768fa07a7ad02a27f3566666
                                                          • Instruction ID: b25e52b650acf198db8d2f7aaede2804ef34910d6299646cbf198d5cea58d20b
                                                          • Opcode Fuzzy Hash: 4a0ba059b0978cefd4cbb373a6146f36c23a603f768fa07a7ad02a27f3566666
                                                          • Instruction Fuzzy Hash: 50215B72104525A6C731AB24EC06FB773ECEF91310F104026FB59D7282EB5DED51C295
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00823840
                                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00823850
                                                          • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00823876
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MoveWindow
                                                          • String ID: Listbox
                                                          • API String ID: 3315199576-2633736733
                                                          • Opcode ID: b1e77fa73ebe4af1c0523debc07ccc5e46f98107ff29c3a2307843fa9c236c07
                                                          • Instruction ID: 872e194d92a2c779bb3adcb4c9c401ae704b5e88e1bfcb3564b24e1d0787bdf0
                                                          • Opcode Fuzzy Hash: b1e77fa73ebe4af1c0523debc07ccc5e46f98107ff29c3a2307843fa9c236c07
                                                          • Instruction Fuzzy Hash: 4C218E72610228BFEF219F54EC85EBB376AFF89754F118124F9149B190C675DC928BA0
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00804A08
                                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00804A5C
                                                          • SetErrorMode.KERNEL32(00000000,?,?,0082CC08), ref: 00804AD0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume
                                                          • String ID: %lu
                                                          • API String ID: 2507767853-685833217
                                                          • Opcode ID: 1dfd41ef653311c4a318eeecf9681afa6fc430e2919278a6f4ce8eb2c91f6c51
                                                          • Instruction ID: 71eeeea773c4d6cb3d9d3a0776ad93406c9961d05cfc2f2a237fbe42fe325330
                                                          • Opcode Fuzzy Hash: 1dfd41ef653311c4a318eeecf9681afa6fc430e2919278a6f4ce8eb2c91f6c51
                                                          • Instruction Fuzzy Hash: 36314C71A00119EFDB10DF64C885EAA7BF8FF09308F1480A9E909DB252D775EE46CB61
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0082424F
                                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00824264
                                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00824271
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: msctls_trackbar32
                                                          • API String ID: 3850602802-1010561917
                                                          • Opcode ID: 8e6abfe2f04356aebb56e5c356f1178b80861f7d2da04529bef89751c7a34ff9
                                                          • Instruction ID: 7f9b059427b039ba6c580b4902e66c176a70e4d61e5cad8bb3d55578c0878d6f
                                                          • Opcode Fuzzy Hash: 8e6abfe2f04356aebb56e5c356f1178b80861f7d2da04529bef89751c7a34ff9
                                                          • Instruction Fuzzy Hash: CA110231240218BEEF205F29DC06FAB3BACFF95B64F110124FA55E20E0D2B1DCA19B20
                                                          APIs
                                                            • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                            • Part of subcall function 007F2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 007F2DC5
                                                            • Part of subcall function 007F2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 007F2DD6
                                                            • Part of subcall function 007F2DA7: GetCurrentThreadId.KERNEL32 ref: 007F2DDD
                                                            • Part of subcall function 007F2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 007F2DE4
                                                          • GetFocus.USER32 ref: 007F2F78
                                                            • Part of subcall function 007F2DEE: GetParent.USER32(00000000), ref: 007F2DF9
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 007F2FC3
                                                          • EnumChildWindows.USER32(?,007F303B), ref: 007F2FEB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                          • String ID: %s%d
                                                          • API String ID: 1272988791-1110647743
                                                          • Opcode ID: 37da5d1dc45387eb4efbcb0e8dae95cb787ac64ad0db7a7601a065bfb21c2ed0
                                                          • Instruction ID: f22ab5bfad28fa38f56a2aad36bdcf81f412d27387f7deb4faefede5dee0c738
                                                          • Opcode Fuzzy Hash: 37da5d1dc45387eb4efbcb0e8dae95cb787ac64ad0db7a7601a065bfb21c2ed0
                                                          • Instruction Fuzzy Hash: 5311A5B1700209ABCF547F709C89EFD376AAF94304F048075FA099B353DE78994A8B60
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008258C1
                                                          • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008258EE
                                                          • DrawMenuBar.USER32(?), ref: 008258FD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$InfoItem$Draw
                                                          • String ID: 0
                                                          • API String ID: 3227129158-4108050209
                                                          • Opcode ID: 1de5a71f4b4faa5ca938ea920c90c3d7e1de8a7c3e49c2122461899b42214ec4
                                                          • Instruction ID: 090c677cb0ad9d8b08fe6c84af568d453e89b1d36e28aa3cd236768e15ff5957
                                                          • Opcode Fuzzy Hash: 1de5a71f4b4faa5ca938ea920c90c3d7e1de8a7c3e49c2122461899b42214ec4
                                                          • Instruction Fuzzy Hash: 61018C31500228EFDB219F51EC48BAEBFB4FF85360F1080A9E849D6151DB308AC4EF21
                                                          APIs
                                                          • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 007ED3BF
                                                          • FreeLibrary.KERNEL32 ref: 007ED3E5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressFreeLibraryProc
                                                          • String ID: GetSystemWow64DirectoryW$X64
                                                          • API String ID: 3013587201-2590602151
                                                          • Opcode ID: 638e484d46b4f59863a2c5406fc7921a452d492780807522d13acdd9275ad18c
                                                          • Instruction ID: 6783ed2285d3e07a9710962bbff66dc38842691a3cd55530665e77e82b42d006
                                                          • Opcode Fuzzy Hash: 638e484d46b4f59863a2c5406fc7921a452d492780807522d13acdd9275ad18c
                                                          • Instruction Fuzzy Hash: E9F0AB72807AA1DBC77112664C5893E3318FF1AB11B698355F612E6291DB2CCC8482E2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d8cafc303357f78443be7bd06fad0b130f3592d80df08f99a380858b738e3cd3
                                                          • Instruction ID: 2bdac5f637c3a7cb700077af051cb6e132dc135858e9cb56f18bfbb190dfd6aa
                                                          • Opcode Fuzzy Hash: d8cafc303357f78443be7bd06fad0b130f3592d80df08f99a380858b738e3cd3
                                                          • Instruction Fuzzy Hash: C8C13875A0020AEFDB14CFA4C898ABEB7B5FF48714F208598E605AB352D735ED41DB90
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInitInitializeUninitialize
                                                          • String ID:
                                                          • API String ID: 1998397398-0
                                                          • Opcode ID: 72dbac0aaaa40420781bebe812a5c9c7f3c19e066bc9be97e9fb9bc783d3f151
                                                          • Instruction ID: becb205b14d91e64db8b49917d2313193dc44cb1a479c3d607c4e7c9c362af44
                                                          • Opcode Fuzzy Hash: 72dbac0aaaa40420781bebe812a5c9c7f3c19e066bc9be97e9fb9bc783d3f151
                                                          • Instruction Fuzzy Hash: 75A15C75208200DFCB14DF28D485A6AB7E9FF88714F058859F98ADB362DB34EE45CB91
                                                          APIs
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0082FC08,?), ref: 007F05F0
                                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0082FC08,?), ref: 007F0608
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,0082CC40,000000FF,?,00000000,00000800,00000000,?,0082FC08,?), ref: 007F062D
                                                          • _memcmp.LIBVCRUNTIME ref: 007F064E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FromProg$FreeTask_memcmp
                                                          • String ID:
                                                          • API String ID: 314563124-0
                                                          • Opcode ID: 7188b0e6ac23ecb9f59ac57abdc56a5e41879b99b1e22d722397747187edd8f1
                                                          • Instruction ID: 1c93727aaa82403371f639cdf317c963a4afa0bcbf6dc3fba052054baa16f9ae
                                                          • Opcode Fuzzy Hash: 7188b0e6ac23ecb9f59ac57abdc56a5e41879b99b1e22d722397747187edd8f1
                                                          • Instruction Fuzzy Hash: 0A811971A00109EFCB04DF94C988DEEB7B9FF89315B204558E616EB251DB75AE06CBA0
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 0081A6AC
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 0081A6BA
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 0081A79C
                                                          • CloseHandle.KERNEL32(00000000), ref: 0081A7AB
                                                            • Part of subcall function 007ACE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,007D3303,?), ref: 007ACE8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                          • String ID:
                                                          • API String ID: 1991900642-0
                                                          • Opcode ID: 8c84fefba26041c505dae3f479f9b7989951b4a7feacc41a1dc30c803bd4f76c
                                                          • Instruction ID: 66db602c2fdbe8bc149b84d02d23b0c22b4f552c3895cc73c5ab1fc4c0d7aaef
                                                          • Opcode Fuzzy Hash: 8c84fefba26041c505dae3f479f9b7989951b4a7feacc41a1dc30c803bd4f76c
                                                          • Instruction Fuzzy Hash: BF513B71508300AFD714EF24D88AA6BBBE8FF89754F40892DF585D7291EB34D904CB92
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: f4f54258ac0ed1c39b77429964f2e91120071a74c51f355a89b568581957361a
                                                          • Instruction ID: 74cef0a22e21d37764e880a7797e4aecfc8770902acb2b6bc33ea99cbfb58e8b
                                                          • Opcode Fuzzy Hash: f4f54258ac0ed1c39b77429964f2e91120071a74c51f355a89b568581957361a
                                                          • Instruction Fuzzy Hash: 64412536A00540FBDB25AAB89C4ABEE3BB4EF41730F54422BF41992392E67C88419261
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 008262E2
                                                          • ScreenToClient.USER32(?,?), ref: 00826315
                                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00826382
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientMoveRectScreen
                                                          • String ID:
                                                          • API String ID: 3880355969-0
                                                          • Opcode ID: ad34e3255ddc34fe49c85f0848e491ec4b84c344937d0149067e05f8c78a6cce
                                                          • Instruction ID: dec6a5c39f23260e25cf14d7b6c086c5f8e7a0ae2b556fe6b10c28f89ed24342
                                                          • Opcode Fuzzy Hash: ad34e3255ddc34fe49c85f0848e491ec4b84c344937d0149067e05f8c78a6cce
                                                          • Instruction Fuzzy Hash: A8512A74A00219EFCF20DF68E885AAE7BB5FF45360F108159F815DB290E771AD91CB90
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 00811AFD
                                                          • WSAGetLastError.WSOCK32 ref: 00811B0B
                                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00811B8A
                                                          • WSAGetLastError.WSOCK32 ref: 00811B94
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$socket
                                                          • String ID:
                                                          • API String ID: 1881357543-0
                                                          • Opcode ID: 8981d9a9d26266a60024e5dd18844fe08b78e595516320fb70c2acc0f14ee968
                                                          • Instruction ID: 43ea4a203e4e290b0eaba66784a8a18dcb8f620fae8c37e9e31b3116af9f9333
                                                          • Opcode Fuzzy Hash: 8981d9a9d26266a60024e5dd18844fe08b78e595516320fb70c2acc0f14ee968
                                                          • Instruction Fuzzy Hash: AD41D235600200AFDB20AF24D88AF6977E5EF49718F54C548F61A8F2D2D776ED818B90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d38806baa81ccccccf371fcb86e0e97442e0a6310a9e8ec58eb3ff18289edfd7
                                                          • Instruction ID: ae0544c8c7324c5d1948c058ea41047b5507a8cf52001c23db766e6c52dae8a9
                                                          • Opcode Fuzzy Hash: d38806baa81ccccccf371fcb86e0e97442e0a6310a9e8ec58eb3ff18289edfd7
                                                          • Instruction Fuzzy Hash: CB410876A04344FFD7289F78CC46FAABBB9EB88710F10452EF541DB282D7799A018780
                                                          APIs
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00805783
                                                          • GetLastError.KERNEL32(?,00000000), ref: 008057A9
                                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 008057CE
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 008057FA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                                          • String ID:
                                                          • API String ID: 3321077145-0
                                                          • Opcode ID: 7b9317d7ec6c646f36891e06bba9c603426aa6156255f4d787f8a78e22cbbdc4
                                                          • Instruction ID: 56a1cb4b625ec48848e65fc286534cc65d5a6fd48d375079bfbcff26cade7aaf
                                                          • Opcode Fuzzy Hash: 7b9317d7ec6c646f36891e06bba9c603426aa6156255f4d787f8a78e22cbbdc4
                                                          • Instruction Fuzzy Hash: F9410735614610DFCF15DF15D548A1EBBE2EF89320B19C498E84AAB362CB34FD01CB91
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000000,?,007B6D71,00000000,00000000,007B82D9,?,007B82D9,?,00000001,007B6D71,?,00000001,007B82D9,007B82D9), ref: 007CD910
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007CD999
                                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 007CD9AB
                                                          • __freea.LIBCMT ref: 007CD9B4
                                                            • Part of subcall function 007C3820: RtlAllocateHeap.NTDLL(00000000,?,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6,?,00791129), ref: 007C3852
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                          • String ID:
                                                          • API String ID: 2652629310-0
                                                          • Opcode ID: 6a0b1b211709a25be9d4486b3fc9a0a9d339c0b78de47fe89dabed63764d31e5
                                                          • Instruction ID: bdac8942d33a6d615343ad074f0efd54c83ce0ae769463bd6efa2dddb080c078
                                                          • Opcode Fuzzy Hash: 6a0b1b211709a25be9d4486b3fc9a0a9d339c0b78de47fe89dabed63764d31e5
                                                          • Instruction Fuzzy Hash: 3231A972A0020AABDB34DF65DC85EAE7BA5EB41310B05426CFC04D7291EB39ED51CBA0
                                                          APIs
                                                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 00825352
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00825375
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00825382
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008253A8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$InvalidateMessageRectSend
                                                          • String ID:
                                                          • API String ID: 3340791633-0
                                                          • Opcode ID: 9aba4272718277fc552ef7306decd5a26b1471bc504f8a396072571d463595ce
                                                          • Instruction ID: 19b1a1bacbf31a7601752b8a42a450190e996cc74a096a5a7282761a169c9dd9
                                                          • Opcode Fuzzy Hash: 9aba4272718277fc552ef7306decd5a26b1471bc504f8a396072571d463595ce
                                                          • Instruction Fuzzy Hash: D1318E34A95A28AEEB30DA14EC1EBE97765FB06390F586102FA11D63E1C7B49DC09B41
                                                          APIs
                                                          • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 007FABF1
                                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 007FAC0D
                                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 007FAC74
                                                          • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 007FACC6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: d6a128844897bc370d683c5bb3a9995a6988a3f89cc88022aa9e38cfaef8a35e
                                                          • Instruction ID: df4777d6467e607ad501833310352ada1548b7d18afcbce412462cfabe4a2e1c
                                                          • Opcode Fuzzy Hash: d6a128844897bc370d683c5bb3a9995a6988a3f89cc88022aa9e38cfaef8a35e
                                                          • Instruction Fuzzy Hash: 9E3116B0A0465CBFEB348B658C087FE7BA6BB49310F04421AE689523D0C37D8985C772
                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 0082769A
                                                          • GetWindowRect.USER32(?,?), ref: 00827710
                                                          • PtInRect.USER32(?,?,00828B89), ref: 00827720
                                                          • MessageBeep.USER32(00000000), ref: 0082778C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Rect$BeepClientMessageScreenWindow
                                                          • String ID:
                                                          • API String ID: 1352109105-0
                                                          • Opcode ID: 5f08ea585a67d2cd35cfd3fc9a92f82b6aea71b986ca9c88958954baa4cfd97f
                                                          • Instruction ID: 63dc7b9b374a7e618ef140a2bf4304401deb5d122b55c937cd061e79f82d510a
                                                          • Opcode Fuzzy Hash: 5f08ea585a67d2cd35cfd3fc9a92f82b6aea71b986ca9c88958954baa4cfd97f
                                                          • Instruction Fuzzy Hash: BB41BF34605265DFDB11CF5AE898EA9BBF4FF48304F1980A8E814DB261C370E982CF90
                                                          APIs
                                                          • GetForegroundWindow.USER32 ref: 008216EB
                                                            • Part of subcall function 007F3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 007F3A57
                                                            • Part of subcall function 007F3A3D: GetCurrentThreadId.KERNEL32 ref: 007F3A5E
                                                            • Part of subcall function 007F3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007F25B3), ref: 007F3A65
                                                          • GetCaretPos.USER32(?), ref: 008216FF
                                                          • ClientToScreen.USER32(00000000,?), ref: 0082174C
                                                          • GetForegroundWindow.USER32 ref: 00821752
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                          • String ID:
                                                          • API String ID: 2759813231-0
                                                          • Opcode ID: d0be3d68864b26dd24c1f6c21a9a0f1d050ded4b44cb83ecce158d0c0dbfb09c
                                                          • Instruction ID: e2c1cdd0b22015534ac2db8a3f9c1477a37f179ef19d37bb310800070b0adccb
                                                          • Opcode Fuzzy Hash: d0be3d68864b26dd24c1f6c21a9a0f1d050ded4b44cb83ecce158d0c0dbfb09c
                                                          • Instruction Fuzzy Hash: 26316172D00109AFCB00EFAAD885CAEB7F9FF88304B548069E415E7211EB359E45CBA0
                                                          APIs
                                                            • Part of subcall function 00797620: _wcslen.LIBCMT ref: 00797625
                                                          • _wcslen.LIBCMT ref: 007FDFCB
                                                          • _wcslen.LIBCMT ref: 007FDFE2
                                                          • _wcslen.LIBCMT ref: 007FE00D
                                                          • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 007FE018
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$ExtentPoint32Text
                                                          • String ID:
                                                          • API String ID: 3763101759-0
                                                          • Opcode ID: 3d0ef4e6ddee22c290d664af05cb8bc8db381b9b22a7b8c15f431240ca27952d
                                                          • Instruction ID: 18f617b0a256d5efc7d52c281d157c89c2cff8578e53cc6b967a313241741760
                                                          • Opcode Fuzzy Hash: 3d0ef4e6ddee22c290d664af05cb8bc8db381b9b22a7b8c15f431240ca27952d
                                                          • Instruction Fuzzy Hash: 48219F71900218EFCB219FA8D985BBEB7F8EF85750F244065E905FB342D6789E41CBA1
                                                          APIs
                                                            • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                          • GetCursorPos.USER32(?), ref: 00829001
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,007E7711,?,?,?,?,?), ref: 00829016
                                                          • GetCursorPos.USER32(?), ref: 0082905E
                                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,007E7711,?,?,?), ref: 00829094
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                          • String ID:
                                                          • API String ID: 2864067406-0
                                                          • Opcode ID: 06e134cf7c1f31cd6e74d92321d95725d2d1ce3d05d6c53af11bfb0310a557aa
                                                          • Instruction ID: dcbf51fa8d186fedacea90e1784b200574220a761e9051b898554290e36dca5f
                                                          • Opcode Fuzzy Hash: 06e134cf7c1f31cd6e74d92321d95725d2d1ce3d05d6c53af11bfb0310a557aa
                                                          • Instruction Fuzzy Hash: 7021BC31600428EFCB268F94D858EFA7BF9FF8A350F054169F9458B261C335A990DB60
                                                          APIs
                                                          • GetFileAttributesW.KERNEL32(?,0082CB68), ref: 007FD2FB
                                                          • GetLastError.KERNEL32 ref: 007FD30A
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 007FD319
                                                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0082CB68), ref: 007FD376
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory$AttributesErrorFileLast
                                                          • String ID:
                                                          • API String ID: 2267087916-0
                                                          • Opcode ID: ccfa93a0f8f9bb38d8fc864d2fc5a2088190b29ad607a895f331fda06b82576b
                                                          • Instruction ID: bbac94718232e9e6193ce0b20a50c3365e0d16d0214ba955af25d44a6d8fddea
                                                          • Opcode Fuzzy Hash: ccfa93a0f8f9bb38d8fc864d2fc5a2088190b29ad607a895f331fda06b82576b
                                                          • Instruction Fuzzy Hash: 6B214871508205DF8720DF28D88587AB7E5BE5A324F104A1DF6A9C32A1EB359D46CB93
                                                          APIs
                                                            • Part of subcall function 007F1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 007F102A
                                                            • Part of subcall function 007F1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 007F1036
                                                            • Part of subcall function 007F1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007F1045
                                                            • Part of subcall function 007F1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 007F104C
                                                            • Part of subcall function 007F1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007F1062
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 007F15BE
                                                          • _memcmp.LIBVCRUNTIME ref: 007F15E1
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F1617
                                                          • HeapFree.KERNEL32(00000000), ref: 007F161E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                          • String ID:
                                                          • API String ID: 1592001646-0
                                                          • Opcode ID: 54b28301d112335057e3401facc1dac506cecbd1f53757bd13961c0768c1018a
                                                          • Instruction ID: bb1ff01d01db9411ebc7a86bd4e5bbde39d71b4f47cb0e2d75d53baebc4a250d
                                                          • Opcode Fuzzy Hash: 54b28301d112335057e3401facc1dac506cecbd1f53757bd13961c0768c1018a
                                                          • Instruction Fuzzy Hash: D3218931E00108EFDF10DFA4C949BFEB7B8EF44354F498459E541AB241EB39AA05CBA0
                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 0082280A
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00822824
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00822832
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00822840
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$AttributesLayered
                                                          • String ID:
                                                          • API String ID: 2169480361-0
                                                          • Opcode ID: 31cb0d43a8931eeb2fd02e34083076bc95fa9370f56022992036a44c4f5c65f1
                                                          • Instruction ID: 2f6a5e980ed60f651754094ae9555e79638e87b69eb55b66331ac30aa2bb7bf5
                                                          • Opcode Fuzzy Hash: 31cb0d43a8931eeb2fd02e34083076bc95fa9370f56022992036a44c4f5c65f1
                                                          • Instruction Fuzzy Hash: 0F219031208525BFD7149B24E845FAA7B95FF49324F148258F426CB6E2CB75EC82CB90
                                                          APIs
                                                            • Part of subcall function 007F8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,007F790A,?,000000FF,?,007F8754,00000000,?,0000001C,?,?), ref: 007F8D8C
                                                            • Part of subcall function 007F8D7D: lstrcpyW.KERNEL32(00000000,?,?,007F790A,?,000000FF,?,007F8754,00000000,?,0000001C,?,?,00000000), ref: 007F8DB2
                                                            • Part of subcall function 007F8D7D: lstrcmpiW.KERNEL32(00000000,?,007F790A,?,000000FF,?,007F8754,00000000,?,0000001C,?,?), ref: 007F8DE3
                                                          • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,007F8754,00000000,?,0000001C,?,?,00000000), ref: 007F7923
                                                          • lstrcpyW.KERNEL32(00000000,?,?,007F8754,00000000,?,0000001C,?,?,00000000), ref: 007F7949
                                                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,007F8754,00000000,?,0000001C,?,?,00000000), ref: 007F7984
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: lstrcmpilstrcpylstrlen
                                                          • String ID: cdecl
                                                          • API String ID: 4031866154-3896280584
                                                          • Opcode ID: 1132093e65541d1bc122bc9b1f510007f5c9bc7ba60a4dc0f311bc50c0e54635
                                                          • Instruction ID: 2efd1c7f64b1d5f9edb73bedca28d971195a0c8421e74bb15e000294466c8c1c
                                                          • Opcode Fuzzy Hash: 1132093e65541d1bc122bc9b1f510007f5c9bc7ba60a4dc0f311bc50c0e54635
                                                          • Instruction Fuzzy Hash: 9411293A200305ABDB259F34CC49D7A77A9FF85350B40812AFA42C73A4EB759811C791
                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00827D0B
                                                          • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00827D2A
                                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00827D42
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0080B7AD,00000000), ref: 00827D6B
                                                            • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID:
                                                          • API String ID: 847901565-0
                                                          • Opcode ID: e0834365711ab521d5500d94fb941935415df3bb8f8f2f3020689817a9d6bbb1
                                                          • Instruction ID: e61e94a71934280f34621f31d5c2415608424896657cf8685f04033ec0db43d4
                                                          • Opcode Fuzzy Hash: e0834365711ab521d5500d94fb941935415df3bb8f8f2f3020689817a9d6bbb1
                                                          • Instruction Fuzzy Hash: 9E11AF31605625AFCB109F29EC08ABA3BA5FF45360B158728F939D72F0D7309991CB50
                                                          APIs
                                                          • SendMessageW.USER32(?,00001060,?,00000004), ref: 008256BB
                                                          • _wcslen.LIBCMT ref: 008256CD
                                                          • _wcslen.LIBCMT ref: 008256D8
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00825816
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend_wcslen
                                                          • String ID:
                                                          • API String ID: 455545452-0
                                                          • Opcode ID: 671d9fa24d79c10024f105deff1f538ced6a0147148ae24133d256b61a8e6ab5
                                                          • Instruction ID: 9580ba114db35a460aa99e384bd952381e1fec8b97963af23a42f51afb01273b
                                                          • Opcode Fuzzy Hash: 671d9fa24d79c10024f105deff1f538ced6a0147148ae24133d256b61a8e6ab5
                                                          • Instruction Fuzzy Hash: FC11D671640628E6DF209F65EC85AFE77ACFF10764B508026F915D6081E774D9C0CB64
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 60e19676ccd7547b2af36959781b11025b0eff358639c870d7cc5f94798e7c1b
                                                          • Instruction ID: 8ff448bee66c02902c46854629027e3bd73dc1b30be42a9eeeecbaa1023661bd
                                                          • Opcode Fuzzy Hash: 60e19676ccd7547b2af36959781b11025b0eff358639c870d7cc5f94798e7c1b
                                                          • Instruction Fuzzy Hash: 99018FB2305A167EF62116786CC5F27671CEF423B8B75033DF522611E7DB689C0156A0
                                                          APIs
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 007F1A47
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007F1A59
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007F1A6F
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007F1A8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: 1cdc524048f3ac55799e3bfad62192923aaa1a3870017be290c062c386b039cd
                                                          • Instruction ID: 5a47171de14f4719f2f1bf5b11cebf853f023f0c7d15a2fdefdf77ccbdbd4e41
                                                          • Opcode Fuzzy Hash: 1cdc524048f3ac55799e3bfad62192923aaa1a3870017be290c062c386b039cd
                                                          • Instruction Fuzzy Hash: C611393AD01219FFEB10DBA5CD85FADBB78FB08750F604091EA00B7290D6716E50DB94
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 007FE1FD
                                                          • MessageBoxW.USER32(?,?,?,?), ref: 007FE230
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 007FE246
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 007FE24D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                          • String ID:
                                                          • API String ID: 2880819207-0
                                                          • Opcode ID: 3b8aa8cdd94e4d26ae2f935be9229c3ed2bb977d48edb6eb73da119b6ba301e4
                                                          • Instruction ID: 9be8e62d510130bb3115779cbd67d94ef22820cf0ee953cf8ac70a1b9617dcd6
                                                          • Opcode Fuzzy Hash: 3b8aa8cdd94e4d26ae2f935be9229c3ed2bb977d48edb6eb73da119b6ba301e4
                                                          • Instruction Fuzzy Hash: E8112B72904258BFDB119FA89C09ABE7FACBB45320F148615F915D3391E3B8CD0087A0
                                                          APIs
                                                          • CreateThread.KERNEL32(00000000,?,007BCFF9,00000000,00000004,00000000), ref: 007BD218
                                                          • GetLastError.KERNEL32 ref: 007BD224
                                                          • __dosmaperr.LIBCMT ref: 007BD22B
                                                          • ResumeThread.KERNEL32(00000000), ref: 007BD249
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                          • String ID:
                                                          • API String ID: 173952441-0
                                                          • Opcode ID: 881449cfb3698208a2118f556acfa75c9345b8200cb772ebede57fab89045a82
                                                          • Instruction ID: d2491451abcd09d99ba66d60cdfd2e6fe60374c026b0afd2eeb7af0e877b2284
                                                          • Opcode Fuzzy Hash: 881449cfb3698208a2118f556acfa75c9345b8200cb772ebede57fab89045a82
                                                          • Instruction Fuzzy Hash: FA019276805208BFDB316BA5DC0EBEE7A69FF81731F204219F925961D0EB798D01C7A1
                                                          APIs
                                                            • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                          • GetClientRect.USER32(?,?), ref: 00829F31
                                                          • GetCursorPos.USER32(?), ref: 00829F3B
                                                          • ScreenToClient.USER32(?,?), ref: 00829F46
                                                          • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00829F7A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Client$CursorLongProcRectScreenWindow
                                                          • String ID:
                                                          • API String ID: 4127811313-0
                                                          • Opcode ID: 7aec3685d80ee34fda9dcc207fb2e84733b6ccfa260db53e21de384c5284e0cd
                                                          • Instruction ID: d17fb3e55335ee5a8a90d542596ac25abb564b5d7dd70bffa6c14a9457cee82f
                                                          • Opcode Fuzzy Hash: 7aec3685d80ee34fda9dcc207fb2e84733b6ccfa260db53e21de384c5284e0cd
                                                          • Instruction Fuzzy Hash: 4811883290012AABCB10DFA8E9899FE77B8FF05301F004451F951E3140DB30BA82CBA1
                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0079604C
                                                          • GetStockObject.GDI32(00000011), ref: 00796060
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 0079606A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateMessageObjectSendStockWindow
                                                          • String ID:
                                                          • API String ID: 3970641297-0
                                                          • Opcode ID: 0778b88673381a5a199bdeb4fbd63218d24897fb115b7992bbda8b646914a6ef
                                                          • Instruction ID: 649f7ed021d05210978879e7beaf8fb5e47d7bcd81fd7d81fbd8d651ce7c3a7e
                                                          • Opcode Fuzzy Hash: 0778b88673381a5a199bdeb4fbd63218d24897fb115b7992bbda8b646914a6ef
                                                          • Instruction Fuzzy Hash: 74118072501508BFEF224FA8EC94EFABBA9FF187A4F044216FA1452110D736DC60DBA0
                                                          APIs
                                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 007B3B56
                                                            • Part of subcall function 007B3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 007B3AD2
                                                            • Part of subcall function 007B3AA3: ___AdjustPointer.LIBCMT ref: 007B3AED
                                                          • _UnwindNestedFrames.LIBCMT ref: 007B3B6B
                                                          • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 007B3B7C
                                                          • CallCatchBlock.LIBVCRUNTIME ref: 007B3BA4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                          • String ID:
                                                          • API String ID: 737400349-0
                                                          • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                          • Instruction ID: 74ef203f8404c04de63dca05f9643c6fa68434eee9a0fbc3489288d6a3aa2ded
                                                          • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                          • Instruction Fuzzy Hash: 34012972100148BBDF126E95CC46EEB7B6AFF48754F044014FE4896121C73AE9A1EBA0
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,007913C6,00000000,00000000,?,007C301A,007913C6,00000000,00000000,00000000,?,007C328B,00000006,FlsSetValue), ref: 007C30A5
                                                          • GetLastError.KERNEL32(?,007C301A,007913C6,00000000,00000000,00000000,?,007C328B,00000006,FlsSetValue,00832290,FlsSetValue,00000000,00000364,?,007C2E46), ref: 007C30B1
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,007C301A,007913C6,00000000,00000000,00000000,?,007C328B,00000006,FlsSetValue,00832290,FlsSetValue,00000000), ref: 007C30BF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: LibraryLoad$ErrorLast
                                                          • String ID:
                                                          • API String ID: 3177248105-0
                                                          • Opcode ID: 077c00b71719fb22db1604b7adabce196b9fdbe67768ebfcdbe35ce79db5b6cd
                                                          • Instruction ID: 94430d53c4350698327f89ee7c31950224ba3f1146844ac23cc6739af6d14d51
                                                          • Opcode Fuzzy Hash: 077c00b71719fb22db1604b7adabce196b9fdbe67768ebfcdbe35ce79db5b6cd
                                                          • Instruction Fuzzy Hash: FA01FC33301626ABCB314B78AC44F67779ABF45B61B11872CF906D3140CB25D942C6D0
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 007F747F
                                                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 007F7497
                                                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 007F74AC
                                                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 007F74CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Type$Register$FileLoadModuleNameUser
                                                          • String ID:
                                                          • API String ID: 1352324309-0
                                                          • Opcode ID: 6edfa34d43423e0f8be2fc731882d575b30c5048675656c36da5204b4d3ee4b6
                                                          • Instruction ID: e5a028c78039ed2585c85dc2b877a64bb51c90c581979d31e96c5f1a368362a5
                                                          • Opcode Fuzzy Hash: 6edfa34d43423e0f8be2fc731882d575b30c5048675656c36da5204b4d3ee4b6
                                                          • Instruction Fuzzy Hash: DC11ADB1205359ABE7309F14EC09BB67BFCFB00B10F108569E626D7291D7B4E904DBA1
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,007FACD3,?,00008000), ref: 007FB0C4
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,007FACD3,?,00008000), ref: 007FB0E9
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,007FACD3,?,00008000), ref: 007FB0F3
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,007FACD3,?,00008000), ref: 007FB126
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CounterPerformanceQuerySleep
                                                          • String ID:
                                                          • API String ID: 2875609808-0
                                                          • Opcode ID: 26c2cd221654c55649fea01a75b8c5a2d7573b479792748e0c1359f0eabecb6c
                                                          • Instruction ID: 51ec25283e899556c58d85ba53db7cef61f08a6928e85138ecc0552e2a897357
                                                          • Opcode Fuzzy Hash: 26c2cd221654c55649fea01a75b8c5a2d7573b479792748e0c1359f0eabecb6c
                                                          • Instruction Fuzzy Hash: 59116D31C01A2CE7CF10AFE4E9696FEBF78FF49711F108086DA41B2281CB3896518B51
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00827E33
                                                          • ScreenToClient.USER32(?,?), ref: 00827E4B
                                                          • ScreenToClient.USER32(?,?), ref: 00827E6F
                                                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00827E8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ClientRectScreen$InvalidateWindow
                                                          • String ID:
                                                          • API String ID: 357397906-0
                                                          • Opcode ID: 0871379442132902b3a80bd569fa975a113ca82492f0ac68eb881d4cf8bfdc6f
                                                          • Instruction ID: ba943ced25b84adc69aef8ac3e92956145d63f19cf6fd734b492b09e474459e9
                                                          • Opcode Fuzzy Hash: 0871379442132902b3a80bd569fa975a113ca82492f0ac68eb881d4cf8bfdc6f
                                                          • Instruction Fuzzy Hash: F91140B9D0020AAFDB51CF99D884AEEBBF9FF18310F509066E915E2210D735AA55CF90
                                                          APIs
                                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 007F2DC5
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 007F2DD6
                                                          • GetCurrentThreadId.KERNEL32 ref: 007F2DDD
                                                          • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 007F2DE4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 2710830443-0
                                                          • Opcode ID: 0699c842ac0476aba4cbd690c3c1f70776f7ef2ceffb2166365ac8aeb7a189eb
                                                          • Instruction ID: 7e7ab9f835e1eedfd7dc54f57ec6be4f01340ca11954cc1a8e0ed6d52a237c17
                                                          • Opcode Fuzzy Hash: 0699c842ac0476aba4cbd690c3c1f70776f7ef2ceffb2166365ac8aeb7a189eb
                                                          • Instruction Fuzzy Hash: 71E06DB12016287BE7301B629C0EEFB7E6CFB52BA1F404119B206D11819AA88842C6B0
                                                          APIs
                                                            • Part of subcall function 007A9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007A9693
                                                            • Part of subcall function 007A9639: SelectObject.GDI32(?,00000000), ref: 007A96A2
                                                            • Part of subcall function 007A9639: BeginPath.GDI32(?), ref: 007A96B9
                                                            • Part of subcall function 007A9639: SelectObject.GDI32(?,00000000), ref: 007A96E2
                                                          • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00828887
                                                          • LineTo.GDI32(?,?,?), ref: 00828894
                                                          • EndPath.GDI32(?), ref: 008288A4
                                                          • StrokePath.GDI32(?), ref: 008288B2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                          • String ID:
                                                          • API String ID: 1539411459-0
                                                          • Opcode ID: 952a3dc8a85956eeb34b4c9382736e74a7f939caa93f2e84580034b2ff63f836
                                                          • Instruction ID: ba179a81d04382f52a6ebd9d61b7c1a74f78329970f9bec3771598d8d387597b
                                                          • Opcode Fuzzy Hash: 952a3dc8a85956eeb34b4c9382736e74a7f939caa93f2e84580034b2ff63f836
                                                          • Instruction Fuzzy Hash: 51F03A36042668FAEF225F94AC0EFDE3E59BF06310F448100FA11A50E2C7B55562CBE5
                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 007A98CC
                                                          • SetTextColor.GDI32(?,?), ref: 007A98D6
                                                          • SetBkMode.GDI32(?,00000001), ref: 007A98E9
                                                          • GetStockObject.GDI32(00000005), ref: 007A98F1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$ModeObjectStockText
                                                          • String ID:
                                                          • API String ID: 4037423528-0
                                                          • Opcode ID: db6338ba68a7bcfb6b48a5f9367bb32339cbaf2dde66e654e5ec160ade8674c7
                                                          • Instruction ID: ab1bcd9601bbc3b16d26792a531a73e6530c3bf8084578ed03ac5591ef65d7cf
                                                          • Opcode Fuzzy Hash: db6338ba68a7bcfb6b48a5f9367bb32339cbaf2dde66e654e5ec160ade8674c7
                                                          • Instruction Fuzzy Hash: 20E06D31244680AADB315B75AC0ABED3F20BB56336F04C21AF6FA580E1C3B58661DB11
                                                          APIs
                                                          • GetCurrentThread.KERNEL32 ref: 007F1634
                                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,007F11D9), ref: 007F163B
                                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,007F11D9), ref: 007F1648
                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,007F11D9), ref: 007F164F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentOpenProcessThreadToken
                                                          • String ID:
                                                          • API String ID: 3974789173-0
                                                          • Opcode ID: 91b8be9903b4e6eec883f4c7fe3444f20e2dbbf75ab3179d2539d724dff2583c
                                                          • Instruction ID: 8ae857bfc7ca525678e06b5106d195f85112775f79470164ab3b858658559435
                                                          • Opcode Fuzzy Hash: 91b8be9903b4e6eec883f4c7fe3444f20e2dbbf75ab3179d2539d724dff2583c
                                                          • Instruction Fuzzy Hash: A9E0E671601211DBD7301FA19D0DB6A7B7CFF55791F14C818F745DA090DA784446C754
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 007ED858
                                                          • GetDC.USER32(00000000), ref: 007ED862
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007ED882
                                                          • ReleaseDC.USER32(?), ref: 007ED8A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 6d737f29e1ee93a1dbe5f819c0542a82054ea8f905a06b2475c813938890e402
                                                          • Instruction ID: 7dc18fd9b4e662c75f8986f0b97e0a18407046fa0765d73edf094ec7b88e2ef7
                                                          • Opcode Fuzzy Hash: 6d737f29e1ee93a1dbe5f819c0542a82054ea8f905a06b2475c813938890e402
                                                          • Instruction Fuzzy Hash: 3EE01AB1800204DFCF619FA0D80C67DBBB2FB18710F14C009F806E7250D7384942AF40
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 007ED86C
                                                          • GetDC.USER32(00000000), ref: 007ED876
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007ED882
                                                          • ReleaseDC.USER32(?), ref: 007ED8A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 4709104586180d889febfd370e1e110ea3b7dd635c32141a068c587c2ffa7e75
                                                          • Instruction ID: 26318164d91b549577329d7ffa8b5a8e68778aed791330b2f99100973c68a6da
                                                          • Opcode Fuzzy Hash: 4709104586180d889febfd370e1e110ea3b7dd635c32141a068c587c2ffa7e75
                                                          • Instruction Fuzzy Hash: A6E092B5C00204EFCF61AFA0D80C66EBBB6FB58711B149449F94AE7250DB385902AF90
                                                          APIs
                                                            • Part of subcall function 00797620: _wcslen.LIBCMT ref: 00797625
                                                          • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00804ED4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Connection_wcslen
                                                          • String ID: *$LPT
                                                          • API String ID: 1725874428-3443410124
                                                          • Opcode ID: 84b7a55cdd11542044bfc65dd73daca297cf091bf4e2ba6f80d8a8b7495c1aef
                                                          • Instruction ID: 7f2dd9ff25f8f9d5d444f28604d637ffcd86b4f8b31426f700451e023d25b605
                                                          • Opcode Fuzzy Hash: 84b7a55cdd11542044bfc65dd73daca297cf091bf4e2ba6f80d8a8b7495c1aef
                                                          • Instruction Fuzzy Hash: E5915EB5A04205DFCB54DF54C884EAABBF1FF44304F159099E90A9B3A2CB35ED85CB91
                                                          APIs
                                                          • __startOneArgErrorHandling.LIBCMT ref: 007BE30D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorHandling__start
                                                          • String ID: pow
                                                          • API String ID: 3213639722-2276729525
                                                          • Opcode ID: 68936689cbb8b4e2b684cfa9c1b3b2e2432e773bba4b49791ebb556f56df96a8
                                                          • Instruction ID: 1b2470f50562bee5b3c8127742f9986658c23543adb2cdb64525791d99035a10
                                                          • Opcode Fuzzy Hash: 68936689cbb8b4e2b684cfa9c1b3b2e2432e773bba4b49791ebb556f56df96a8
                                                          • Instruction Fuzzy Hash: 6E512961A0C60296CB197714C945BFA3BE8BB50741F348D6CE096833A9EF3D8C95DE86
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: #
                                                          • API String ID: 0-1885708031
                                                          • Opcode ID: eb253bba222dc651e4e37b186e1c83610d7665dbd63806dbf99a16a45944bfd2
                                                          • Instruction ID: 1d441742a6b82f36fce7762cc61817deea475513ed6297e82074bdb61db0d636
                                                          • Opcode Fuzzy Hash: eb253bba222dc651e4e37b186e1c83610d7665dbd63806dbf99a16a45944bfd2
                                                          • Instruction Fuzzy Hash: 7F513435501286DFDF25DF29C485ABA7BA4FFAA310F248559FC919B2C0D63C9D42CBA0
                                                          APIs
                                                          • Sleep.KERNEL32(00000000), ref: 007AF2A2
                                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 007AF2BB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemorySleepStatus
                                                          • String ID: @
                                                          • API String ID: 2783356886-2766056989
                                                          • Opcode ID: 6a53db1df7cfd15c2bd80e0a95e5d9d18e95bca14c3d83f5797eccd01f3c88e6
                                                          • Instruction ID: 64da553f5b4a3ee07643f61f6f5067a6f3013538241bf21f043bb36a76c79113
                                                          • Opcode Fuzzy Hash: 6a53db1df7cfd15c2bd80e0a95e5d9d18e95bca14c3d83f5797eccd01f3c88e6
                                                          • Instruction Fuzzy Hash: BA516772418744DBDB20AF14EC8ABAFBBF8FB85300F81885CF1D941095EB748569CB66
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 008157E0
                                                          • _wcslen.LIBCMT ref: 008157EC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper_wcslen
                                                          • String ID: CALLARGARRAY
                                                          • API String ID: 157775604-1150593374
                                                          • Opcode ID: 411eae235b4bb56cba84710a75e365ac1ae1453e00f249df7e4819715963405f
                                                          • Instruction ID: f71176ef81a41e9b5ac0c537e10ef4d6f5562707acd245e556f585c354258f19
                                                          • Opcode Fuzzy Hash: 411eae235b4bb56cba84710a75e365ac1ae1453e00f249df7e4819715963405f
                                                          • Instruction Fuzzy Hash: 76418C31A00209DFCB14DFA9C8869FEBBB9FF99724F104169E505E7291E7349D81CBA0
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 0080D130
                                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0080D13A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CrackInternet_wcslen
                                                          • String ID: |
                                                          • API String ID: 596671847-2343686810
                                                          • Opcode ID: 8e41848927b717492749ab17e87c1199ca0f40206e90b1c11b264b192c72f8db
                                                          • Instruction ID: 819c1fef96cca6512c7fd9359c783528300538ab935c47c8cd7ea8cea3c118b9
                                                          • Opcode Fuzzy Hash: 8e41848927b717492749ab17e87c1199ca0f40206e90b1c11b264b192c72f8db
                                                          • Instruction Fuzzy Hash: 22311971D00209EBCF15EFA4DC89AEEBFB9FF04340F000119F815A6162EB35AA06CB60
                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?,?), ref: 00823621
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0082365C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$DestroyMove
                                                          • String ID: static
                                                          • API String ID: 2139405536-2160076837
                                                          • Opcode ID: f2ca701e3c00247ff59dc49c8eec1b6dd0fc7896dd6696a9518723e7c1e77418
                                                          • Instruction ID: 56420c82864c857ae2b3a5e9274d8d6900e80c78e796ffc51634dd90d313c317
                                                          • Opcode Fuzzy Hash: f2ca701e3c00247ff59dc49c8eec1b6dd0fc7896dd6696a9518723e7c1e77418
                                                          • Instruction Fuzzy Hash: CD318F71110614AEDB209F28EC90EBB73A9FF98724F109619F8A5D7280DA35AD91D760
                                                          APIs
                                                          • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 0082461F
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00824634
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: '
                                                          • API String ID: 3850602802-1997036262
                                                          • Opcode ID: 5593837eb5513ffd4989385c3a9ec41e4b2ad9fd19c0fb5bc6e0bcd43cf98562
                                                          • Instruction ID: 00a4964598df136835bd8056418354f97085762d4c5b93b0dbb258c25dbe20e2
                                                          • Opcode Fuzzy Hash: 5593837eb5513ffd4989385c3a9ec41e4b2ad9fd19c0fb5bc6e0bcd43cf98562
                                                          • Instruction Fuzzy Hash: 2B313874A0121A9FDF14CFA9D981BDABBB5FF19300F14506AE904EB381D771A981CFA0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0082327C
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00823287
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: Combobox
                                                          • API String ID: 3850602802-2096851135
                                                          • Opcode ID: 3cfa0041a918a5a84baa68a3b33a1a6295e4f56a32f6f3dfa058fc5b6e0ed017
                                                          • Instruction ID: c19874b9e845657c378395590919058a9fa0ed8f2f6f18c519255929f67e5c80
                                                          • Opcode Fuzzy Hash: 3cfa0041a918a5a84baa68a3b33a1a6295e4f56a32f6f3dfa058fc5b6e0ed017
                                                          • Instruction Fuzzy Hash: 1111E271300218BFEF219E54EC94EBB3B6AFB943A5F104129F918E7290D6399D918760
                                                          APIs
                                                            • Part of subcall function 0079600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0079604C
                                                            • Part of subcall function 0079600E: GetStockObject.GDI32(00000011), ref: 00796060
                                                            • Part of subcall function 0079600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0079606A
                                                          • GetWindowRect.USER32(00000000,?), ref: 0082377A
                                                          • GetSysColor.USER32(00000012), ref: 00823794
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                          • String ID: static
                                                          • API String ID: 1983116058-2160076837
                                                          • Opcode ID: 1c945fd04aab8e2b4e9d8741cad16498faf273975c60a9be3dd92ff05f55250d
                                                          • Instruction ID: 476b28e78ee812caa609133232d2c1193d0176faa6232ea4b352e42abfd08d30
                                                          • Opcode Fuzzy Hash: 1c945fd04aab8e2b4e9d8741cad16498faf273975c60a9be3dd92ff05f55250d
                                                          • Instruction Fuzzy Hash: 9B1129B2610219AFDF10DFA8DC45EFE7BB9FB08314F004525F955E2250E779E8519B50
                                                          APIs
                                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0080CD7D
                                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0080CDA6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$OpenOption
                                                          • String ID: <local>
                                                          • API String ID: 942729171-4266983199
                                                          • Opcode ID: 56501e12a4de5330303eebd0b2567d867b346eb86ef16b5e1e94dba6158479e6
                                                          • Instruction ID: c4d8fc1b5ae6d607e762ea3716b5fcb2d30cda9e23fd6c55dccafe2774fa3dd3
                                                          • Opcode Fuzzy Hash: 56501e12a4de5330303eebd0b2567d867b346eb86ef16b5e1e94dba6158479e6
                                                          • Instruction Fuzzy Hash: A311A371215635BED7B44F668C45EF7BE69FF127A4F004326B909C31C0E6649845D6F0
                                                          APIs
                                                          • GetWindowTextLengthW.USER32(00000000), ref: 008234AB
                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 008234BA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: LengthMessageSendTextWindow
                                                          • String ID: edit
                                                          • API String ID: 2978978980-2167791130
                                                          • Opcode ID: 5eeff508d21d567d826de16ae7ebf24370f7bf8f83bd527ebac3b436e0195417
                                                          • Instruction ID: 138c8761fc68c0d632bb9d0219267a30d46d8ce6b1569f8f5c403058d54a5ab8
                                                          • Opcode Fuzzy Hash: 5eeff508d21d567d826de16ae7ebf24370f7bf8f83bd527ebac3b436e0195417
                                                          • Instruction Fuzzy Hash: 4411BF71100128ABEF216E64EC54ABB3B6AFB24378F504364FA60D31D0C779DD919B68
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                          • CharUpperBuffW.USER32(?,?,?), ref: 007F6CB6
                                                          • _wcslen.LIBCMT ref: 007F6CC2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: STOP
                                                          • API String ID: 1256254125-2411985666
                                                          • Opcode ID: 4ddc2e1e09125ad1a425e2deafaaf2de7ff81d266a650836538402331de8596d
                                                          • Instruction ID: 683588fcbf434ca7dcb0ce7d18724b8cca4c0c02ccb85b24b4dbc8873c352235
                                                          • Opcode Fuzzy Hash: 4ddc2e1e09125ad1a425e2deafaaf2de7ff81d266a650836538402331de8596d
                                                          • Instruction Fuzzy Hash: 2501263270052A9BCF20AFFDDC949BF73B4FB617107000528EAA293295EB39E804C660
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 007F1D4C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 987b66fe8dab1d1b01e25c3d730787f7c4d520ff8b561a203721219e4eecb3a5
                                                          • Instruction ID: a35a45f7ea954f98d71f5aab71628208fe3f5dd06029c01a09aac447cb2ea2de
                                                          • Opcode Fuzzy Hash: 987b66fe8dab1d1b01e25c3d730787f7c4d520ff8b561a203721219e4eecb3a5
                                                          • Instruction Fuzzy Hash: 4301B571701218EB9F14EBA4DC59CFE73B8FB56360F44091EAA32673D1EA395908C670
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 007F1C46
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: a0e2ec4efed4c1f733741d271993e225e0500ae417df8ee5e40d56c34b32ab53
                                                          • Instruction ID: 79cd98f64539424afc9bc0ed86f27c75d21b319ef23002e7c6b929eab789810a
                                                          • Opcode Fuzzy Hash: a0e2ec4efed4c1f733741d271993e225e0500ae417df8ee5e40d56c34b32ab53
                                                          • Instruction Fuzzy Hash: B901A77568110CE6DF14EBA4DD69DFF77A89B12340F54001DAA16773C1EA289E0CC6B1
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 007F1CC8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 57180678dbd98f1fc99445c4eeaf7f950ba1e2458cce5e9a679ba180bec5c6e2
                                                          • Instruction ID: 1797e5b7f96d57c8e21981343347e23c1b86737cdf9b2e5877a69474f7a17720
                                                          • Opcode Fuzzy Hash: 57180678dbd98f1fc99445c4eeaf7f950ba1e2458cce5e9a679ba180bec5c6e2
                                                          • Instruction Fuzzy Hash: E001DB71A4011CE7DF14EBA5DE15EFE77A8AB11340F540019BA1273381EA299F08C671
                                                          APIs
                                                            • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                            • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                          • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 007F1DD3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 4b4245cf5c396a72b579ff53d773c37ff02c3494e78ab9149069ba5f01eadd10
                                                          • Instruction ID: 230cd29f0aa3690de7c6681ab96e2c4ab472052c994f3b3bc53db75dc6be913a
                                                          • Opcode Fuzzy Hash: 4b4245cf5c396a72b579ff53d773c37ff02c3494e78ab9149069ba5f01eadd10
                                                          • Instruction Fuzzy Hash: FDF0A971B41218E6DF14E7A5DC59EFE7778AB02350F44091DBA32633C1DA685908C271
                                                          APIs
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 007B0668
                                                            • Part of subcall function 007B32A4: RaiseException.KERNEL32(?,?,?,007B068A,?,00861444,?,?,?,?,?,?,007B068A,00791129,00858738,00791129), ref: 007B3304
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 007B0685
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$ExceptionRaise
                                                          • String ID: Unknown exception
                                                          • API String ID: 3476068407-410509341
                                                          • Opcode ID: c552264d82be9d1ffca2f8f75d5dbd0197d5b6ef7d242c9fb9679a21ea97e346
                                                          • Instruction ID: 3626fd04f278ba540db8005f23b9ba1035353744a8bb6961e8f182ee64b1ecff
                                                          • Opcode Fuzzy Hash: c552264d82be9d1ffca2f8f75d5dbd0197d5b6ef7d242c9fb9679a21ea97e346
                                                          • Instruction Fuzzy Hash: 61F0C23490020DF78F14B6A4D85AEDF776CAE40354B608131F924D6592EF79DA69C6C0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: 3, 3, 16, 1
                                                          • API String ID: 176396367-3042988571
                                                          • Opcode ID: 2e0b1b8745d89c07aa5c8dc4e0b259426896168835ef83008eeb3fa94c415ec1
                                                          • Instruction ID: 7eaeed67d993a5841a7449fc8971d7b5067847596be7aad9b0a49975ab4573cb
                                                          • Opcode Fuzzy Hash: 2e0b1b8745d89c07aa5c8dc4e0b259426896168835ef83008eeb3fa94c415ec1
                                                          • Instruction Fuzzy Hash: 71E02B422042206093311279ACC5AFF569DEFC97A0714182FF981C2267EA989DD193A5
                                                          APIs
                                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 007F0B23
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Message
                                                          • String ID: AutoIt$Error allocating memory.
                                                          • API String ID: 2030045667-4017498283
                                                          • Opcode ID: 0f2026b6baee4413c99f9225859528f4ee9b20a68b71408feffd089e0408421f
                                                          • Instruction ID: cb4acf06fea1841e82f6a5cd4c2f9b54c95ac680113d91c675999978849da1cf
                                                          • Opcode Fuzzy Hash: 0f2026b6baee4413c99f9225859528f4ee9b20a68b71408feffd089e0408421f
                                                          • Instruction Fuzzy Hash: 29E0D831244318AAD22036D47C07F9D7AC4DF05B51F100466FB58956C38AE9649006E9
                                                          APIs
                                                            • Part of subcall function 007AF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,007B0D71,?,?,?,0079100A), ref: 007AF7CE
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,0079100A), ref: 007B0D75
                                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0079100A), ref: 007B0D84
                                                          Strings
                                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 007B0D7F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                          • API String ID: 55579361-631824599
                                                          • Opcode ID: c7c9c8787d553fd1690e14eaa90b8c720391bcb72139990ca5c0db59b0318963
                                                          • Instruction ID: 0f444fe215b3e5e9297a2355cdfc3fc98f3384fd4cddb92ccb103d491989860f
                                                          • Opcode Fuzzy Hash: c7c9c8787d553fd1690e14eaa90b8c720391bcb72139990ca5c0db59b0318963
                                                          • Instruction Fuzzy Hash: 4AE039742003118BD7309FA8E4083967BF0FB00740F018A2DE482C6692DBB8E485CBD1
                                                          APIs
                                                          • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0080302F
                                                          • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00803044
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: Temp$FileNamePath
                                                          • String ID: aut
                                                          • API String ID: 3285503233-3010740371
                                                          • Opcode ID: bc7e20b08accb3c677a1653666d00bccb1597611aa0965d274a725b6a4fbdccc
                                                          • Instruction ID: 1112bb476bc0119a6db6099ebff125cb221dd4474c45e91966fe3c56f41f8ca9
                                                          • Opcode Fuzzy Hash: bc7e20b08accb3c677a1653666d00bccb1597611aa0965d274a725b6a4fbdccc
                                                          • Instruction Fuzzy Hash: 7BD05E72500328A7DA30A7A4AC0EFDB3B6CEB04751F4002A1BA55E2091EEB49985CAD0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: LocalTime
                                                          • String ID: %.3d$X64
                                                          • API String ID: 481472006-1077770165
                                                          • Opcode ID: 1f1483404cc33f1dbd66dacf2565b29f4fa8a804c2e90d909f912d3828b7662f
                                                          • Instruction ID: 024f023edb2cb0e06106a9e3ab918785cddcfe0e37c986ad8b78773d6d103d26
                                                          • Opcode Fuzzy Hash: 1f1483404cc33f1dbd66dacf2565b29f4fa8a804c2e90d909f912d3828b7662f
                                                          • Instruction Fuzzy Hash: E3D012A180A148E9CB7097E1DD498BAB37CFB4D341F508452FA16E1040D62CCD086761
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0082232C
                                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0082233F
                                                            • Part of subcall function 007FE97B: Sleep.KERNELBASE ref: 007FE9F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: e4b61351f83c09a380eb88b520f7c926514c4f20c35c76ad9bd93ae9f3782a6b
                                                          • Instruction ID: 171d1e66da8aa8da75d4195de7836ff97b3e12d8dd9e8da2b47a63ede3f65305
                                                          • Opcode Fuzzy Hash: e4b61351f83c09a380eb88b520f7c926514c4f20c35c76ad9bd93ae9f3782a6b
                                                          • Instruction Fuzzy Hash: EBD0A932390300B6E2B4AB309C0FFEA6A04BB00B00F008A167705AA2E0C8F4A8028A10
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0082236C
                                                          • PostMessageW.USER32(00000000), ref: 00822373
                                                            • Part of subcall function 007FE97B: Sleep.KERNELBASE ref: 007FE9F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 544619f5943db683e1fa011d9ada96cc0a07ff85338e2bda62263239ef9db915
                                                          • Instruction ID: ce53e60186df15dd93e3dfe62d3df5e96b13a2decb46665d0ebaa99cfd6bbc2b
                                                          • Opcode Fuzzy Hash: 544619f5943db683e1fa011d9ada96cc0a07ff85338e2bda62263239ef9db915
                                                          • Instruction Fuzzy Hash: 34D0C932391710BAE6B4AB709C0FFDA6615BB14B11F408A167755EA2E0D9F4B8068A54
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 007CBE93
                                                          • GetLastError.KERNEL32 ref: 007CBEA1
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007CBEFC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2100531064.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                          • Associated: 00000000.00000002.2100516528.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100582860.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100619810.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2100634465.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_790000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorLast
                                                          • String ID:
                                                          • API String ID: 1717984340-0
                                                          • Opcode ID: a7c5839a6a6a3a2c645723a44979097a3b68f6dacc785474cefd3bfae193a3c2
                                                          • Instruction ID: f2a073a2eae75c8ba818b7af1c5a280cbd7290c4f3304bacf9e2b5088783a8a7
                                                          • Opcode Fuzzy Hash: a7c5839a6a6a3a2c645723a44979097a3b68f6dacc785474cefd3bfae193a3c2
                                                          • Instruction Fuzzy Hash: BB41D235600216EFDF218FA5CC8AFBE7BA5AF41720F14416DF9599B2A1DB388D05CB60