Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1524409
MD5:983a1a23eb06ef4323ee7a01425e47ef
SHA1:cbdbfb1f18152b7205e9b4a647b269fe0a413154
SHA256:c6b13a9fc461010cf268d60923813c067b7b2c382573f16d538067e8210ceba6
Tags:exeuser-Bitsight
Infos:

Detection

Credential Flusher
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Credential Flusher
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of debugger detection
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • file.exe (PID: 6676 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 983A1A23EB06EF4323EE7A01425E47EF)
    • taskkill.exe (PID: 6724 cmdline: taskkill /F /IM chrome.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 6748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • chrome.exe (PID: 6916 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 6360 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 --field-trial-handle=2280,i,13778231416929703980,17669459964122129621,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7864 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5796 --field-trial-handle=2280,i,13778231416929703980,17669459964122129621,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7872 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=2280,i,13778231416929703980,17669459964122129621,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: file.exe PID: 6676JoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: file.exeJoe Sandbox ML: detected
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49755 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49759 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.4:49769 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.4:49785 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001BDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_001BDBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001C68EE FindFirstFileW,FindClose,0_2_001C68EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001C698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_001C698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001BD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_001BD076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001BD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_001BD3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001C9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_001C9642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001C979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_001C979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001C9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_001C9B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001C5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_001C5C97
    Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
    Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001CCE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_001CCE44
    Source: global trafficHTTP traffic detected: GET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1Host: youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiTocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1Host: www.youtube.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiTocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=555306652&timestamp=1727888458918 HTTP/1.1Host: accounts.youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-wow64: ?0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiTocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: iframeReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
    Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiTocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: NID=518=K0eKjaNklXRZ50lSgNrYReWzWA-fsxRiO0RMxlvwkCQ-ug_yL0-9pnttPLyBXSW_1lG0-I4niidVESLRLVXm2mThCQdIkwPXuF30HhtSVKqM7TbAkPdQZqDHCsTTG-4D5a071Cll6VGx9FWmo6b2GtxwDR5mcjZx-sW5vc9wJy3T63FWwg
    Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=4WVoa1EKVMpv428&MD=3agPLFr8 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
    Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=4WVoa1EKVMpv428&MD=3agPLFr8 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
    Source: chromecache_89.5.drString found in binary or memory: _.fq(p)+"/familylink/privacy/notice/embedded?langCountry="+_.fq(p);break;case "PuZJUb":a+="https://www.youtube.com/t/terms?chromeless=1&hl="+_.fq(m);break;case "fxTQxb":a+="https://youtube.com/t/terms?gl="+_.fq(_.oq(c))+"&hl="+_.fq(d)+"&override_hl=1"+(f?"&linkless=1":"");break;case "prAmvd":a+="https://www.google.com/intl/"+_.fq(m)+"/chromebook/termsofservice.html?languageCode="+_.fq(d)+"&regionCode="+_.fq(c);break;case "NfnTze":a+="https://policies.google.com/privacy/google-partners"+(f?"/embedded": equals www.youtube.com (Youtube)
    Source: global trafficDNS traffic detected: DNS query: youtube.com
    Source: global trafficDNS traffic detected: DNS query: www.youtube.com
    Source: global trafficDNS traffic detected: DNS query: www.google.com
    Source: global trafficDNS traffic detected: DNS query: accounts.youtube.com
    Source: global trafficDNS traffic detected: DNS query: play.google.com
    Source: unknownHTTP traffic detected: POST /log?format=json&hasfast=true&authuser=0 HTTP/1.1Host: play.google.comConnection: keep-aliveContent-Length: 505sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"Content-Type: application/x-www-form-urlencoded;charset=UTF-8sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"X-Goog-AuthUser: 0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: */*Origin: https://accounts.google.comX-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiTocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: chromecache_88.5.drString found in binary or memory: https://accounts.google.com
    Source: chromecache_88.5.drString found in binary or memory: https://accounts.google.com/TOS?loc=
    Source: chromecache_85.5.drString found in binary or memory: https://apis.google.com/js/api.js
    Source: chromecache_88.5.drString found in binary or memory: https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage
    Source: chromecache_89.5.drString found in binary or memory: https://families.google.com/intl/
    Source: chromecache_85.5.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/drive_2020q4/v10/192px.svg
    Source: chromecache_85.5.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/gmail_2020q4/v10/web-48dp/logo_gmail_2020q4_color_2x_web_
    Source: chromecache_85.5.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/maps/v7/192px.svg
    Source: chromecache_88.5.drString found in binary or memory: https://g.co/recover
    Source: chromecache_89.5.drString found in binary or memory: https://play.google.com/log?format=json&hasfast=true
    Source: chromecache_88.5.drString found in binary or memory: https://play.google.com/work/enroll?identifier=
    Source: chromecache_89.5.drString found in binary or memory: https://play.google/intl/
    Source: chromecache_89.5.drString found in binary or memory: https://policies.google.com/privacy
    Source: chromecache_89.5.drString found in binary or memory: https://policies.google.com/privacy/additional
    Source: chromecache_89.5.drString found in binary or memory: https://policies.google.com/privacy/google-partners
    Source: chromecache_89.5.drString found in binary or memory: https://policies.google.com/technologies/cookies
    Source: chromecache_89.5.drString found in binary or memory: https://policies.google.com/technologies/location-data
    Source: chromecache_89.5.drString found in binary or memory: https://policies.google.com/terms
    Source: chromecache_89.5.drString found in binary or memory: https://policies.google.com/terms/location
    Source: chromecache_89.5.drString found in binary or memory: https://policies.google.com/terms/service-specific
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-email-pin.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-password.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-or-voice-pin.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-pin.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-stop-go-landing-page_1x.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/animation/
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_device.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_pin.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_1x.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_2x.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_darkmode_1x.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/continue_on_your_phone.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_phone_number_verification.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_silent_tap_yes_darkmode.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes_darkmode.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_dark_v2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_v2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_not_ready.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_dark_1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_darkmode_1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_darkmode_1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_created.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_full_house.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_darkmode_1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_darkmode_1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_darkmode_1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_stop.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/personalization_reminders.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/phone_number_sign_in_2x.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_ios_center.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_laptop.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered_darkmode.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_phone.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_ios.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_pulldown.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_tapyes.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/smart_lock_2x.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/usb_key.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/web_and_app_activity.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/who_will_be_using_this_device.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/you_tube_history.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/gmail_ios_authzen.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/paaskey.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_light.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/screenlock.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_ipad.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_nfc.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_usb.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_phone.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_keys.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/loading_spinner_gm.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/progress_spinner_color_20dp_4x.gif
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/success-gm-default_2x.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/apps/signup/resources/custom-email-address.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/images/hpp/shield_security_checkup_green_2x_web_96dp.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_dark_1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_v1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_dark_v1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_v1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_dark_v1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_v1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_confirmation.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_0.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_dark_0.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_dark_2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_dark_2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_dark_2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_dark_2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_dark_3.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_dark_1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_dark_1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_dark_2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_dark_1.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_dark_2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_dark_v2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_v2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set_darkmode.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_v2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_dark_v2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_v2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space_dark.png
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2_dark.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess.svg
    Source: chromecache_85.5.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess_dark.svg
    Source: chromecache_88.5.drString found in binary or memory: https://support.google.com/accounts?hl=
    Source: chromecache_89.5.drString found in binary or memory: https://support.google.com/accounts?p=new-si-ui
    Source: chromecache_88.5.drString found in binary or memory: https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072
    Source: chromecache_85.5.drString found in binary or memory: https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
    Source: chromecache_88.5.drString found in binary or memory: https://www.google.com
    Source: chromecache_89.5.drString found in binary or memory: https://www.google.com/intl/
    Source: chromecache_85.5.drString found in binary or memory: https://www.gstatic.com/accounts/speedbump/authzen_optin_illustration.gif
    Source: chromecache_85.5.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/chrome_48dp.png
    Source: chromecache_85.5.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/googleg_48dp.png
    Source: chromecache_85.5.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/gsa_48dp.png
    Source: chromecache_85.5.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/play_prism_48dp.png
    Source: chromecache_85.5.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/youtube_48dp.png
    Source: chromecache_89.5.drString found in binary or memory: https://www.gstatic.com/images/branding/productlogos/googleg/v6/36px.svg
    Source: chromecache_89.5.drString found in binary or memory: https://www.youtube.com/t/terms?chromeless=1&hl=
    Source: file.exe, 00000000.00000002.1785354679.0000000000DC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
    Source: chromecache_89.5.drString found in binary or memory: https://youtube.com/t/terms?gl=
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
    Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
    Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
    Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
    Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
    Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
    Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49672
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
    Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
    Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49755 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49759 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.4:49769 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.4:49785 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001CEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_001CEAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001CED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_001CED6A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001CEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_001CEAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001BAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_001BAA57
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001E9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_001E9576

    System Summary

    barindex
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
    Source: file.exe, 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_2ad8575e-9
    Source: file.exe, 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_62ba9946-7
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_1c14c61d-a
    Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_5829edae-1
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001BD5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_001BD5EB
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001B1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_001B1201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001BE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_001BE8F6
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0015BF400_2_0015BF40
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001C20460_2_001C2046
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001580600_2_00158060
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001B82980_2_001B8298
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0018E4FF0_2_0018E4FF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0018676B0_2_0018676B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001E48730_2_001E4873
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0017CAA00_2_0017CAA0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0015CAF00_2_0015CAF0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0016CC390_2_0016CC39
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00186DD90_2_00186DD9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0016B1190_2_0016B119
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001591C00_2_001591C0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001713940_2_00171394
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001717060_2_00171706
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0017781B0_2_0017781B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001579200_2_00157920
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0016997D0_2_0016997D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001719B00_2_001719B0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00177A4A0_2_00177A4A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00171C770_2_00171C77
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00177CA70_2_00177CA7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001DBE440_2_001DBE44
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00189EEE0_2_00189EEE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00171F320_2_00171F32
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 00170A30 appears 46 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 0016F9F2 appears 31 times
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: classification engineClassification label: mal68.troj.evad.winEXE@34/32@12/7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001C37B5 GetLastError,FormatMessageW,0_2_001C37B5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001B10BF AdjustTokenPrivileges,CloseHandle,0_2_001B10BF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001B16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_001B16C3
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001C51CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_001C51CD
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001DA67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_001DA67C
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001C648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_001C648E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001542A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_001542A2
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6748:120:WilError_03
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 --field-trial-handle=2280,i,13778231416929703980,17669459964122129621,262144 /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5796 --field-trial-handle=2280,i,13778231416929703980,17669459964122129621,262144 /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=2280,i,13778231416929703980,17669459964122129621,262144 /prefetch:8
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobarsJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 --field-trial-handle=2280,i,13778231416929703980,17669459964122129621,262144 /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5796 --field-trial-handle=2280,i,13778231416929703980,17669459964122129621,262144 /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=2280,i,13778231416929703980,17669459964122129621,262144 /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001542DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001542DE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00170A76 push ecx; ret 0_2_00170A89
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0016F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0016F98E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001E1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_001E1C41
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-97509
    Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.8 %
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001BDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_001BDBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001C68EE FindFirstFileW,FindClose,0_2_001C68EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001C698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_001C698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001BD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_001BD076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001BD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_001BD3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001C9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_001C9642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001C979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_001C979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001C9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_001C9B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001C5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_001C5C97
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001542DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001542DE

    Anti Debugging

    barindex
    Source: C:\Users\user\Desktop\file.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_0-96630
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001CEAA2 BlockInput,0_2_001CEAA2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00182622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00182622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001542DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001542DE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00174CE8 mov eax, dword ptr fs:[00000030h]0_2_00174CE8
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001B0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_001B0B62
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00182622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00182622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0017083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0017083F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001709D5 SetUnhandledExceptionFilter,0_2_001709D5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00170C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00170C21
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001B1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_001B1201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00192BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00192BA5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0016F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0016F98E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001D22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_001D22DA
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001B0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_001B0B62
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001B1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_001B1663
    Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
    Source: file.exeBinary or memory string: Shell_TrayWnd
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00170698 cpuid 0_2_00170698
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001C8195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_001C8195
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001AD27A GetUserNameW,0_2_001AD27A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0018BB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_0018BB6F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001542DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001542DE

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 6676, type: MEMORYSTR
    Source: file.exeBinary or memory string: WIN_81
    Source: file.exeBinary or memory string: WIN_XP
    Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
    Source: file.exeBinary or memory string: WIN_XPe
    Source: file.exeBinary or memory string: WIN_VISTA
    Source: file.exeBinary or memory string: WIN_7
    Source: file.exeBinary or memory string: WIN_8

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 6676, type: MEMORYSTR
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001D1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_001D1204
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001D1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_001D1806
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure2
    Valid Accounts
    1
    Windows Management Instrumentation
    1
    DLL Side-Loading
    1
    Exploitation for Privilege Escalation
    2
    Disable or Modify Tools
    21
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    2
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts1
    Native API
    2
    Valid Accounts
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol21
    Input Capture
    11
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
    Valid Accounts
    2
    Obfuscated Files or Information
    Security Account Manager1
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
    Access Token Manipulation
    1
    DLL Side-Loading
    NTDS16
    System Information Discovery
    Distributed Component Object ModelInput Capture4
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
    Process Injection
    2
    Valid Accounts
    LSA Secrets22
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
    Virtualization/Sandbox Evasion
    Cached Domain Credentials2
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
    Access Token Manipulation
    DCSync2
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
    Process Injection
    Proc Filesystem1
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1524409 Sample: file.exe Startdate: 02/10/2024 Architecture: WINDOWS Score: 68 34 Yara detected Credential Flusher 2->34 36 Binary is likely a compiled AutoIt script file 2->36 38 Machine Learning detection for sample 2->38 40 AI detected suspicious sample 2->40 7 file.exe 2->7         started        process3 signatures4 42 Binary is likely a compiled AutoIt script file 7->42 44 Found API chain indicative of debugger detection 7->44 46 Found API chain indicative of sandbox detection 7->46 10 chrome.exe 1 7->10         started        13 taskkill.exe 1 7->13         started        process5 dnsIp6 24 192.168.2.4, 138, 443, 49300 unknown unknown 10->24 26 239.255.255.250 unknown Reserved 10->26 15 chrome.exe 10->15         started        18 chrome.exe 10->18         started        20 chrome.exe 6 10->20         started        22 conhost.exe 13->22         started        process7 dnsIp8 28 youtube-ui.l.google.com 142.250.185.142, 443, 49734 GOOGLEUS United States 15->28 30 play.google.com 142.250.185.174, 443, 49761, 49763 GOOGLEUS United States 15->30 32 6 other IPs or domains 15->32

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    file.exe11%ReversingLabs
    file.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://play.google/intl/0%URL Reputationsafe
    https://families.google.com/intl/0%URL Reputationsafe
    https://policies.google.com/technologies/location-data0%URL Reputationsafe
    https://apis.google.com/js/api.js0%URL Reputationsafe
    https://policies.google.com/privacy/google-partners0%URL Reputationsafe
    https://policies.google.com/terms/service-specific0%URL Reputationsafe
    https://g.co/recover0%URL Reputationsafe
    https://policies.google.com/privacy/additional0%URL Reputationsafe
    https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=32850720%URL Reputationsafe
    https://policies.google.com/technologies/cookies0%URL Reputationsafe
    https://policies.google.com/terms0%URL Reputationsafe
    https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=0%URL Reputationsafe
    https://support.google.com/accounts?hl=0%URL Reputationsafe
    https://policies.google.com/terms/location0%URL Reputationsafe
    https://policies.google.com/privacy0%URL Reputationsafe
    https://support.google.com/accounts?p=new-si-ui0%URL Reputationsafe
    https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    youtube-ui.l.google.com
    142.250.185.142
    truefalse
      unknown
      www3.l.google.com
      142.250.185.78
      truefalse
        unknown
        play.google.com
        142.250.185.174
        truefalse
          unknown
          www.google.com
          172.217.23.100
          truefalse
            unknown
            youtube.com
            142.250.185.78
            truefalse
              unknown
              accounts.youtube.com
              unknown
              unknownfalse
                unknown
                www.youtube.com
                unknown
                unknownfalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://play.google.com/log?format=json&hasfast=true&authuser=0false
                    unknown
                    https://www.google.com/favicon.icofalse
                      unknown
                      https://play.google.com/log?hasfast=true&authuser=0&format=jsonfalse
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://play.google/intl/chromecache_89.5.drfalse
                        • URL Reputation: safe
                        unknown
                        https://families.google.com/intl/chromecache_89.5.drfalse
                        • URL Reputation: safe
                        unknown
                        https://youtube.com/t/terms?gl=chromecache_89.5.drfalse
                          unknown
                          https://policies.google.com/technologies/location-datachromecache_89.5.drfalse
                          • URL Reputation: safe
                          unknown
                          https://www.google.com/intl/chromecache_89.5.drfalse
                            unknown
                            https://apis.google.com/js/api.jschromecache_85.5.drfalse
                            • URL Reputation: safe
                            unknown
                            https://policies.google.com/privacy/google-partnerschromecache_89.5.drfalse
                            • URL Reputation: safe
                            unknown
                            https://play.google.com/work/enroll?identifier=chromecache_88.5.drfalse
                              unknown
                              https://policies.google.com/terms/service-specificchromecache_89.5.drfalse
                              • URL Reputation: safe
                              unknown
                              https://g.co/recoverchromecache_88.5.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/privacy/additionalchromecache_89.5.drfalse
                              • URL Reputation: safe
                              unknown
                              https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072chromecache_88.5.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/technologies/cookieschromecache_89.5.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/termschromecache_89.5.drfalse
                              • URL Reputation: safe
                              unknown
                              https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=chromecache_85.5.drfalse
                              • URL Reputation: safe
                              unknown
                              https://www.google.comchromecache_88.5.drfalse
                                unknown
                                https://play.google.com/log?format=json&hasfast=truechromecache_89.5.drfalse
                                  unknown
                                  https://www.youtube.com/t/terms?chromeless=1&hl=chromecache_89.5.drfalse
                                    unknown
                                    https://support.google.com/accounts?hl=chromecache_88.5.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://policies.google.com/terms/locationchromecache_89.5.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://policies.google.com/privacychromecache_89.5.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://support.google.com/accounts?p=new-si-uichromecache_89.5.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessagechromecache_88.5.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    142.250.185.78
                                    www3.l.google.comUnited States
                                    15169GOOGLEUSfalse
                                    216.58.206.78
                                    unknownUnited States
                                    15169GOOGLEUSfalse
                                    239.255.255.250
                                    unknownReserved
                                    unknownunknownfalse
                                    142.250.185.174
                                    play.google.comUnited States
                                    15169GOOGLEUSfalse
                                    142.250.185.142
                                    youtube-ui.l.google.comUnited States
                                    15169GOOGLEUSfalse
                                    172.217.23.100
                                    www.google.comUnited States
                                    15169GOOGLEUSfalse
                                    IP
                                    192.168.2.4
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1524409
                                    Start date and time:2024-10-02 18:59:51 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 4m 54s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:13
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:file.exe
                                    Detection:MAL
                                    Classification:mal68.troj.evad.winEXE@34/32@12/7
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 95%
                                    • Number of executed functions: 46
                                    • Number of non-executed functions: 307
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 172.217.16.195, 66.102.1.84, 142.250.185.206, 34.104.35.123, 142.250.184.195, 142.250.185.138, 142.250.184.202, 142.250.185.106, 172.217.16.138, 142.250.184.234, 172.217.18.10, 142.250.185.74, 216.58.206.42, 216.58.212.170, 142.250.185.234, 142.250.186.170, 142.250.185.170, 142.250.186.42, 142.250.181.234, 142.250.186.106, 142.250.185.202, 93.184.221.240, 192.229.221.95, 142.250.186.74, 142.250.186.138, 172.217.16.202, 172.217.18.106, 216.58.212.138, 216.58.206.74, 142.250.185.67, 64.233.166.84, 172.217.16.206
                                    • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, content-autofill.googleapis.com, slscr.update.microsoft.com, fonts.gstatic.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, update.googleapis.com, clients.l.google.com, www.gstatic.com, optimizationguide-pa.googleapis.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                    • VT rate limit hit for: file.exe
                                    No simulations
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    239.255.255.250file.exeGet hashmaliciousUnknownBrowse
                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                              27987136e29b3032ad40982c8b7c2e168112c9601e08da806119dcba615524b5.htmlGet hashmaliciousUnknownBrowse
                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                        No context
                                                        No context
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        28a2c9bd18a11de089ef85a160da29e4file.exeGet hashmaliciousUnknownBrowse
                                                        • 4.175.87.197
                                                        • 184.28.90.27
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 4.175.87.197
                                                        • 184.28.90.27
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 4.175.87.197
                                                        • 184.28.90.27
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 4.175.87.197
                                                        • 184.28.90.27
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 4.175.87.197
                                                        • 184.28.90.27
                                                        27987136e29b3032ad40982c8b7c2e168112c9601e08da806119dcba615524b5.htmlGet hashmaliciousUnknownBrowse
                                                        • 4.175.87.197
                                                        • 184.28.90.27
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 4.175.87.197
                                                        • 184.28.90.27
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 4.175.87.197
                                                        • 184.28.90.27
                                                        New_Statement-8723107.jsGet hashmaliciousUnknownBrowse
                                                        • 4.175.87.197
                                                        • 184.28.90.27
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 4.175.87.197
                                                        • 184.28.90.27
                                                        No context
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (468)
                                                        Category:downloaded
                                                        Size (bytes):1858
                                                        Entropy (8bit):5.298162049824456
                                                        Encrypted:false
                                                        SSDEEP:48:o7vGoolL3ALFKphnpiu7xOKAcfO/3d/rYh4vZorw:o/QLUFUL4KA+2y0Mw
                                                        MD5:CE055F881BDAB4EF6C1C8AA4B3890348
                                                        SHA1:2671741A70E9F5B608F690AAEEA4972003747654
                                                        SHA-256:9B91C23691D6032CDFE28863E369624B2EDB033E1487A1D1BB0977E3590E5462
                                                        SHA-512:8A22250628985C2E570E6FBADFC0D5CB6753F0735130F9E74962A409476C2859C5C81F8A0F5C427A9F13ED399C8E251FA43FF67AD5F16860640D45E7A538E857
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,ZwDk9d,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=iAskyc,ziXSP"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("iAskyc");._.QZ=function(a){_.W.call(this,a.Fa);this.window=a.Ea.window.get();this.Nc=a.Ea.Nc};_.J(_.QZ,_.W);_.QZ.Ba=function(){return{Ea:{window:_.qu,Nc:_.DE}}};_.QZ.prototype.Po=function(){};_.QZ.prototype.addEncryptionRecoveryMethod=function(){};_.RZ=function(a){return(a==null?void 0:a.Jo)||function(){}};_.SZ=function(a){return(a==null?void 0:a.m3)||function(){}};_.GPb=function(a){return(a==null?void 0:a.Op)||function(){}};._.HPb=function(a){return new Map(Array.from(a,function(b){var c=_.n(b);b=c.next().value;c=c.next().value;return[b,c.map(function(d){return{epoch:d.epoch,key:new Uint8Array(d.key)}})]}))};_.IPb=function(a){setTimeout(function(){throw a;},0)};_.QZ.prototype.kO=function(){return!0};_.nu(_.An,_.QZ);._.l();._.k("ziXSP");.var j_=function(a){_.QZ.call(this,a.Fa)};_.J(j_,_.QZ);j_.Ba=_.QZ.Ba;j_.prototype.Po=function(a,b,c){var d;if((d=this.window.chrome)==nu
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                                        Category:downloaded
                                                        Size (bytes):5430
                                                        Entropy (8bit):3.6534652184263736
                                                        Encrypted:false
                                                        SSDEEP:48:wIJct3xIAxG/7nvWDtZcdYLtX7B6QXL3aqG8Q:wIJct+A47v+rcqlBPG9B
                                                        MD5:F3418A443E7D841097C714D69EC4BCB8
                                                        SHA1:49263695F6B0CDD72F45CF1B775E660FDC36C606
                                                        SHA-256:6DA5620880159634213E197FAFCA1DDE0272153BE3E4590818533FAB8D040770
                                                        SHA-512:82D017C4B7EC8E0C46E8B75DA0CA6A52FD8BCE7FCF4E556CBDF16B49FC81BE9953FE7E25A05F63ECD41C7272E8BB0A9FD9AEDF0AC06CB6032330B096B3702563
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        URL:https://www.google.com/favicon.ico
                                                        Preview:............ .h...&... .... .........(....... ..... ............................................0...................................................................................................................................v.].X.:.X.:.r.Y........................................q.X.S.4.S.4.S.4.S.4.S.4.S.4...X....................0........q.W.S.4.X.:.................J...A...g.........................K.H.V.8..........................F..B.....................,.......................................B..............................................B..B..B..B..B...u..........................................B..B..B..B..B...{.................5.......k...........................................................7R..8F.................................................2........Vb..5C..;I..................R^.....................0................Xc..5C..5C..5C..5C..5C..5C..lv..........................................]i..<J..:G..Zf....................................................
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (683)
                                                        Category:downloaded
                                                        Size (bytes):3131
                                                        Entropy (8bit):5.355381206612617
                                                        Encrypted:false
                                                        SSDEEP:48:o7FEEM3MtH15jNQ8jsK3rnw0dkckTrKEp/OqLE9xz0W5Bzv3M6hIHYA+JITbwrF8:oq675jOArwoAmI/DLaxNPL5m+m6w
                                                        MD5:E2A7251AD83A0D0634FEA2703D10ED07
                                                        SHA1:90D72011F31FC40D3DA3748F2817F90A29EB5C01
                                                        SHA-256:1079B49C4AAF5C10E4F2E6A086623F40D200A71FF2A1F64E88AA6C91E4BE7A6F
                                                        SHA-512:CD6D75580EA8BD97CF7C7C0E0BD9D9A54FB6EA7DF1DDB5A95E94D38B260F9EE1425C640839ECD229B8D01E145CF2786CA374D31EC537EB8FE17FF415D5B985F5
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ZwDk9d,RMhBfe"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("ZwDk9d");.var gA=function(a){_.W.call(this,a.Fa)};_.J(gA,_.W);gA.Ba=_.W.Ba;gA.prototype.eS=function(a){return _.Xe(this,{Xa:{gT:_.ll}}).then(function(b){var c=window._wjdd,d=window._wjdc;return!c&&d?new _.li(function(e){window._wjdc=function(f){d(f);e(ZJa(f,b,a))}}):ZJa(c,b,a)})};var ZJa=function(a,b,c){return(a=a&&a[c])?a:b.Xa.gT.eS(c)};.gA.prototype.aa=function(a,b){var c=_.Zra(b).Rj;if(c.startsWith("$")){var d=_.gm.get(a);_.uq[b]&&(d||(d={},_.gm.set(a,d)),d[c]=_.uq[b],delete _.uq[b],_.vq--);if(d)if(a=d[c])b=_.af(a);else throw Error("Jb`"+b);else b=null}else b=null;return b};_.nu(_.Lfa,gA);._.l();._.k("SNUn3");._.YJa=new _.pf(_.wg);._.l();._.k("RMhBfe");.var $Ja=function(a){var b=_.tq(a);return b?new _.li(function(c,d){var e=function(){b=_.tq(a);var f=_.Sfa(a,b);f?c(f.getAttribute("jsdata")):window.document.readyState=="complete"?(f=["Unable to find deferred jsdata wit
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (395)
                                                        Category:downloaded
                                                        Size (bytes):1652
                                                        Entropy (8bit):5.269909938363071
                                                        Encrypted:false
                                                        SSDEEP:48:o72ZrNZDuZW4yNAbU+15fMxIdf5WENoBCbw7DbG2bEJrw:oyRuZMNAY+1i4HoBNG2Ilw
                                                        MD5:63E5B24335CCDC457DD0B69AD1891CF9
                                                        SHA1:8DD3AED0737BEDBEE133BA564D3CA43579A138F7
                                                        SHA-256:FB72BE79F85659D5AF831FD644C4702EA5BFC6E6A90CDB156DE0816B179278C0
                                                        SHA-512:EC3A143FED571A7FC490433F11DDBD66752E42F0BAC476F79F9B8310DB0419CAE2B8CD65F1283D590F5979F4CC1FB8B2610F106BF38E0B93F384201B8BF5E5DA
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=xUdipf,OTA3Ae,A1yn5d,fKUV3e,aurFic,Ug7Xab,NwH0H,OmgaI,gychg,w9hDv,EEDORb,Mlhmy,ZfAoz,kWgXee,ovKuLd,yDVVkb,ebZ3mb,ZDZcre,A7fCU"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("w9hDv");._.vg(_.Hla);_.eA=function(a){_.W.call(this,a.Fa);this.aa=a.Xa.cache};_.J(_.eA,_.W);_.eA.Ba=function(){return{Xa:{cache:_.dt}}};_.eA.prototype.execute=function(a){_.Bb(a,function(b){var c;_.$e(b)&&(c=b.eb.kc(b.kb));c&&this.aa.xG(c)},this);return{}};_.nu(_.Nla,_.eA);._.l();._.k("lOO0Vd");._.VZa=new _.pf(_.Am);._.l();._.k("ZDZcre");.var fH=function(a){_.W.call(this,a.Fa);this.Wl=a.Ea.Wl;this.d4=a.Ea.metadata;this.aa=a.Ea.ot};_.J(fH,_.W);fH.Ba=function(){return{Ea:{Wl:_.KG,metadata:_.VZa,ot:_.HG}}};fH.prototype.execute=function(a){var b=this;a=this.aa.create(a);return _.Bb(a,function(c){var d=b.d4.getType(c.Od())===2?b.Wl.Rb(c):b.Wl.fetch(c);return _.yl(c,_.LG)?d.then(function(e){return _.Dd(e)}):d},this)};_.nu(_.Sla,fH);._.l();._.k("K5nYTd");._.UZa=new _.pf(_.Ola);._.l();._.k("sP4Vbe");.._.l();._.k("kMFpHd");.._.l();._.k("A7fCU");.var NG=function(a){_.W.call(this,a
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (2907)
                                                        Category:downloaded
                                                        Size (bytes):22833
                                                        Entropy (8bit):5.425034548615223
                                                        Encrypted:false
                                                        SSDEEP:384:7lFo6ZEdpgtmyiPixV9OX9gMBpHkHnfst9lZulagGcwYHiRFjJzN7:77o6ZviPixV8xpEHn89l4IgGcwYCRtb7
                                                        MD5:749B18538FE32BFE0815D75F899F5B21
                                                        SHA1:AF95A019211AF69F752A43CAA54A83C2AFD41D28
                                                        SHA-256:116B2687C1D5E00DB56A79894AB0C12D4E2E000B9379B7E7AD751B84DF611F3F
                                                        SHA-512:E4B6F4556AA0FD9979BB52681508F5E26FFB256473803F74F7F5C8D93FA3636D7D0A5835618FBC6123022805CE0D9616A7451A0F302C665E28A6090B5D588505
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=RqjULd"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.uu.prototype.da=_.ca(40,function(){return _.rj(this,3)});_.$y=function(a,b){this.key=a;this.defaultValue=!1;this.flagName=b};_.$y.prototype.ctor=function(a){return typeof a==="boolean"?a:this.defaultValue};_.az=function(){this.ka=!0;var a=_.vj(_.dk(_.Be("TSDtV",window),_.zya),_.uu,1,_.qj())[0];if(a){var b={};for(var c=_.n(_.vj(a,_.Aya,2,_.qj())),d=c.next();!d.done;d=c.next()){d=d.value;var e=_.Jj(d,1).toString();switch(_.tj(d,_.vu)){case 3:b[e]=_.Hj(d,_.lj(d,_.vu,3));break;case 2:b[e]=_.Jj(d,_.lj(d,_.vu,2));break;case 4:b[e]=_.Kj(d,_.lj(d,_.vu,4));break;case 5:b[e]=_.Lj(d,_.lj(d,_.vu,5));break;case 6:b[e]=_.Pj(d,_.ff,6,_.vu);break;default:throw Error("jd`"+_.tj(d,_.vu));}}}else b={};this.ea=b;this.token=.a?a.da():null};_.az.prototype.aa=function(a){if(!this.ka||a.key in this.ea)a=a.ctor(this.ea[a.key]);else if(_.Be("nQyAE",window)){var b=_.Cya(a.flagName);if(b===null)a=a.de
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
                                                        Category:downloaded
                                                        Size (bytes):52280
                                                        Entropy (8bit):7.995413196679271
                                                        Encrypted:true
                                                        SSDEEP:1536:1rvqtK8DZilXxwJ8mMwAZy7phqsFLdG3B4d:xytBZits8bw4wzbFxG3B4d
                                                        MD5:F61F0D4D0F968D5BBA39A84C76277E1A
                                                        SHA1:AA3693EA140ECA418B4B2A30F6A68F6F43B4BEB2
                                                        SHA-256:57147F08949ABABE7DEEF611435AE418475A693E3823769A25C2A39B6EAD9CCC
                                                        SHA-512:6C3BD90F709BCF9151C9ED9FFEA55C4F6883E7FDA2A4E26BF018C83FE1CFBE4F4AA0DB080D6D024070D53B2257472C399C8AC44EEFD38B9445640EFA85D5C487
                                                        Malicious:false
                                                        URL:https://fonts.gstatic.com/s/googlesans/v58/4UaRrENHsxJlGDuGo1OIlJfC6l_24rlCK1Yo_Iq2vgCI.woff2
                                                        Preview:wOF2.......8.....................................^...$..4?HVAR..?MVAR9.`?STAT.*',..J/.......`..(..Z.0..R.6.$.... .....K..[..q..c..T.....>.P.j.`.w..#...%......N.".....$..3.0.6......... .L.rX/r[j.y.|*(.4.%#.....2.v.m..-..%.....;-.Y.{..&..O=#l@...k..7g..ZI...#.Z./+T..r7...M..3).Z%.x....s..sL..[A!.5*1w'/.8V..2Z..%.X.h.o.).]..9..Q`.$.....7..kZ.~O........d..g.n.d.Rw+&....Cz..uy#..fz,(.J....v.%..`..9.....h...?O..:...c%.....6s....xl..#...5..._......1.>.)"U.4 W....?%......6//!$...!.n9C@n...........!""^.....W..Z<.7.x.."UT.T....E.."R>.R..t.....H d..e_.K../.+8.Q.P.ZQ....;...U....]......._.e*......71.?.7.ORv.?...l...G|.P...|:...I.X..2.,.L........d.g.]}W#uW]QnuP-s.;.-Y.....].......C..j_.M0...y.......J..........NY..@A...,....-.F......'..w./j5g.vUS...U..0.&...y7.LP.....%.....Y......Y..D. e.A..G.?.$.......6...eaK.n5.m...N...,...+BCl..L> .E9~.b[.w.x....6<...}.e...%V....O.......*.?...a..#[eE.4..p..$...].....%......o._......N.._~..El....b..A.0.r8.....|..D.d..
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (533)
                                                        Category:downloaded
                                                        Size (bytes):9210
                                                        Entropy (8bit):5.404371326611379
                                                        Encrypted:false
                                                        SSDEEP:192:EEFZpeip4HzZlY0If0Ma23jcUcrhCx6VD1TYPi8:Es/p4jgjUhtD1TY68
                                                        MD5:21E893B65627B397E22619A9F5BB9662
                                                        SHA1:F561B0F66211C1E7B22F94B4935C312AB7087E85
                                                        SHA-256:FFA9B8BC8EF2CDFF5EB4BA1A0BA1710A253A5B42535E2A369D5026967DCF4673
                                                        SHA-512:3DE3CD6A4E9B06AB3EB324E90A40B5F2AEEA8D7D6A2651C310E993CF79EEB5AC6E2E33C587F46B2DD20CC862354FD1A61AEBB9B990E6805F6629404BA285F8FA
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,byfTOb,cYShmd,eVCnO,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,qPfo0c,qmdT9,rCcCxc,siKnQd,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ltDFwf,SD8Jgb,rmumx,E87wgc,qPYxq,Tbb4sb,pxq3x,f8Gu1e,soHxf,YgOFye,yRXbo,bTi8wc,ywOR5c,PHUIyb"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.qNa=_.y("SD8Jgb",[]);._.GX=function(a,b){if(typeof b==="string")a.Lc(b);else if(b instanceof _.Fp&&b.ia&&b.ia===_.A)b=_.Ya(b.Lw()),a.empty().append(b);else if(b instanceof _.Ua)b=_.Ya(b),a.empty().append(b);else if(b instanceof Node)a.empty().append(b);else throw Error("Vf");};_.HX=function(a){var b=_.Io(a,"[jsslot]");if(b.size()>0)return b;b=new _.Go([_.Kk("span")]);_.Jo(b,"jsslot","");a.empty().append(b);return b};_.NLb=function(a){return a===null||typeof a==="string"&&_.Hi(a)};._.k("SD8Jgb");._.MX=function(a){_.X.call(this,a.Fa);this.Ua=a.controller.Ua;this.od=a.controllers.od[0]||null;this.header=a.controller.header;this.nav=a.controller.nav;var b;(b=this.oa().find("button:not([type])").el())==null||b.setAttribute("type","button")};_.J(_.MX,_.X);_.MX.Ba=function(){return{controller:{Ua:{jsname:"n7vHCb",ctor:_.mv},header:{jsname:"tJHJj",ctor:_.mv},nav:{jsname:"DH6Rkf",ct
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (553)
                                                        Category:downloaded
                                                        Size (bytes):743936
                                                        Entropy (8bit):5.791086230020914
                                                        Encrypted:false
                                                        SSDEEP:6144:YVXWBQkPdzg5pTX1ROv/duPzd8C3s891/N:Nfd8j91/N
                                                        MD5:1A3606C746E7B1C949D9078E8E8C1244
                                                        SHA1:56A3EB1E93E61ACD7AAD39DC3526CB60E23651B1
                                                        SHA-256:5F49AE5162183E2EF6F082B29EC99F18DB0212B8ADDB03699B1BFB0AC7869742
                                                        SHA-512:F2D15243311C472331C5F3F083BB6C18D38EC0247A3F3CBAFD96DBA40E4EAE489CDA04176672E39FE3760EF7347596B2A5EAB0FB0125E881EF514475C99863B9
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/excm=_b,_tp,identifierview/ed=1/dg=0/wt=2/ujg=1/rs=AOaEmlE6O04h0gj7Nu50q-nmaRKM6WWcJw/m=_b,_tp"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([0x286081c4, 0x2046d860, 0x39e13c40, 0x14501e80, 0xe420, 0x0, 0x1a000000, 0x1d000003, 0xc, ]);./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright 2024 Google, Inc. SPDX-License-Identifier: MIT.*/./*. SPDX-License-Identifier: Apache-2.0.*/./*. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var baa,daa,Ma,Sa,gaa,iaa,jb,qaa,waa,Caa,Haa,Kaa,Jb,Laa,Ob,Qb,Rb,Maa,Naa,Sb,Oaa,Paa,Qaa,Yb,Vaa,Xaa,ec,fc,gc,bba,cba,gba,jba,lba,mba,qba,tba,nba,sba,rba,pba,oba,uba,yba,Cba,Dba,Aba,Hc,Ic,Gba,Iba,Mba,Nba,Oba,Pba,Lba,Qba,Sba,dd,Uba,Vba,Xba,Zba,Yba,aca,bca,cca,dca,fca,eca,hca,ica,jca,kca,nca,
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (755)
                                                        Category:downloaded
                                                        Size (bytes):1416
                                                        Entropy (8bit):5.275155058463166
                                                        Encrypted:false
                                                        SSDEEP:24:kMYD7hqCsNRxoYTY9/qoVk7hz1l2p6vDMW94uEQOeGbCx4VGbgCSFBV87O/BprGJ:o7hv6oy12kvwKEeGbC6GbHSh/Hrw
                                                        MD5:4DB6842CDFAC9E03D7C1CF87E398B357
                                                        SHA1:08158AB8F5947E048C88A1289E9E8CE9641B7CE9
                                                        SHA-256:8991D23B586608AE114E150355FF192B30A379EAB1DC3F1444109DDC52B13AC1
                                                        SHA-512:FB7C461DFB96B10E099C3BA41C45AA904BB7D473EF0D44BD6A2E841BC44336DD5F1C9B73919B79A6BF4AA13B806E742F2003A16528E995374E210BB4C3E96EFA
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,ZwDk9d,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=P6sQOc"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("P6sQOc");.var $Za=!!(_.Kh[1]&16);var b_a=function(a,b,c,d,e){this.ea=a;this.wa=b;this.ka=c;this.Ca=d;this.Ga=e;this.aa=0;this.da=a_a(this)},c_a=function(a){var b={};_.La(a.yS(),function(e){b[e]=!0});var c=a.pS(),d=a.tS();return new b_a(a.qP(),c.aa()*1E3,a.WR(),d.aa()*1E3,b)},a_a=function(a){return Math.random()*Math.min(a.wa*Math.pow(a.ka,a.aa),a.Ca)},OG=function(a,b){return a.aa>=a.ea?!1:b!=null?!!a.Ga[b]:!0};var PG=function(a){_.W.call(this,a.Fa);this.da=a.Ea.EV;this.ea=a.Ea.metadata;a=a.Ea.Xga;this.fetch=a.fetch.bind(a)};_.J(PG,_.W);PG.Ba=function(){return{Ea:{EV:_.YZa,metadata:_.VZa,Xga:_.OZa}}};PG.prototype.aa=function(a,b){if(this.ea.getType(a.Od())!==1)return _.Sm(a);var c=this.da.eV;return(c=c?c_a(c):null)&&OG(c)?_.wya(a,d_a(this,a,b,c)):_.Sm(a)};.var d_a=function(a,b,c,d){return c.then(function(e){return e},function(e){if($Za)if(e instanceof _.lf){if(!e.status||
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:HTML document, ASCII text, with very long lines (681)
                                                        Category:downloaded
                                                        Size (bytes):4066
                                                        Entropy (8bit):5.363016925556486
                                                        Encrypted:false
                                                        SSDEEP:96:G2CiFZX5BReR68ujioIRVrqtyzBeTV6SfyAKLif9c7w:bCMZXVeR6jiosVrqtyzBaImyAKw9x
                                                        MD5:FC5E597D923838E10390DADD12651A81
                                                        SHA1:C9959F8D539DB5DF07B8246EC12539B6A9CC101F
                                                        SHA-256:A7EBD5280C50AE93C061EAE1E9727329E015E97531F8F2D82D0E3EA76ADB37B4
                                                        SHA-512:784CA572808F184A849388723FBB3701E6981D885BBA8A330A933F90BF0B36A2E4A491D4463A27911B1D9F7A7134F23E15F187FC7CB4554EAE9BC252513EED7C
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZakeSe,ZfAoz,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=sOXFj,q0xTif,ZZ4WUe"
                                                        Preview:"use strict";_F_installCss(".N7rBcd{overflow-x:auto}sentinel{}");.this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.vg(_.aqa);._.k("sOXFj");.var tu=function(a){_.W.call(this,a.Fa)};_.J(tu,_.W);tu.Ba=_.W.Ba;tu.prototype.aa=function(a){return a()};_.nu(_.$pa,tu);._.l();._.k("oGtAuc");._.yya=new _.pf(_.aqa);._.l();._.k("q0xTif");.var sza=function(a){var b=function(d){_.Sn(d)&&(_.Sn(d).Jc=null,_.Du(d,null));d.XyHi9&&(d.XyHi9=null)};b(a);a=a.querySelectorAll("[c-wiz]");for(var c=0;c<a.length;c++)b(a[c])},Pu=function(a){_.kt.call(this,a.Fa);this.Qa=this.dom=null;if(this.kl()){var b=_.zm(this.Ug(),[_.Em,_.Dm]);b=_.ni([b[_.Em],b[_.Dm]]).then(function(c){this.Qa=c[0];this.dom=c[1]},null,this);_.hu(this,b)}this.Ra=a.lm.zea};_.J(Pu,_.kt);Pu.Ba=function(){return{lm:{zea:function(a){return _.Ue(a)}}}};Pu.prototype.zp=function(a){return this.Ra.zp(a)};.Pu.prototype.getData=function(a){return this.Ra.getData(a)};Pu.prototype.qo=function(){_.Kt(this.d
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (2544)
                                                        Category:downloaded
                                                        Size (bytes):358799
                                                        Entropy (8bit):5.624587482410481
                                                        Encrypted:false
                                                        SSDEEP:6144:T/wM8RGYcBlKmhCxiDlnc0pYMSrBg5X3rU:TD8XxEdA
                                                        MD5:A51DFF6CB98C15CBA0A2B688CC0A862F
                                                        SHA1:5CF15DBD322A0F9CF3A820013E185EC2EDD56BB0
                                                        SHA-256:854215C9FE46B6029883F37C44512F7EB10BA97FC7A623C237DC6824BD92DB1E
                                                        SHA-512:D1036F2C4AE71BE22315D5AEC062E1D59EA2570D7138B97F367149C9622BEE35EAC1DBE9818AC7BE107D88683089EBE220951D025CC11908055B108B27D7BD86
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,EFQ78c,EIOG1e,GwYlN,I6YDgd,IZT63,K0PMbc,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,bSspM,byfTOb,cYShmd,eVCnO,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,lwddkf,m9oV,mzzZzc,n73qwf,njlZCf,oLggrd,qPfo0c,qmdT9,rCcCxc,siKnQd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,y5vRwf,zbML3c,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=K1ZKnb,ziZ8Mc,b3kMqb,mvkUhe,CMcBD,Fndnac,t2srLd,EN3i8d,z0u0L,xiZRqc"
                                                        Preview:"use strict";_F_installCss(".r4WGQb{position:relative}.Dl08I>:first-child{margin-top:0}.Dl08I>:last-child{margin-bottom:0}.IzwVE{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-family:\"Google Sans\",roboto,\"Noto Sans Myanmar UI\",arial,sans-serif;font-size:1.25rem;font-weight:400;letter-spacing:0rem;line-height:1.2}.l5PPKe{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-size:1rem}.l5PPKe .dMNVAe{margin:0;padding:0}.l5PPKe>:first-child{margin-top:0;padding-top:0}.l5PPKe>:last-child{margin-bottom:0;padding-bottom:0}.Dl08I{margin:0;padding:0;position:relative}.Dl08I>.SmR8:only-child{padding-top:1px}.Dl08I>.SmR8:only-child::before{top:0}.Dl08I>.SmR8:not(first-child){padding-bottom:1px}.Dl08I>.SmR8::after{bottom:0}.Dl08I>.SmR8:only-child::before,.Dl08I>.SmR8::after{border-bottom:1px solid #c4c7c5;border-bottom:1px solid var(--gm3-sys-color-outline-variant,#c4c7c5);content:\"\";height:0;left:0;position:absolute;width:100%}.aZvCDf{margin-top:8px;margin-left
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (3190)
                                                        Category:downloaded
                                                        Size (bytes):339747
                                                        Entropy (8bit):5.53363647964667
                                                        Encrypted:false
                                                        SSDEEP:3072:Vuv7kVKtaVFuzDXG6ZfzeelpRv9xqjne01T2HemAIaDlC6diGVOY50UlRQQIBeDq:svaKtM6ZfTxene0F2HemAaGP6BBe2
                                                        MD5:D2D05D80ACF53F04C1BEB6A387216F5E
                                                        SHA1:6E8B87D352419E28C5F8E3881787DC6C56CEB26E
                                                        SHA-256:4BA0D4EA27446C609D515539A334E3B16A4AC7BF936A996CF7E3927FFDDD569F
                                                        SHA-512:966582697B455B2DDC52210A0F46EFD77EDC67D668E7FC2F14E18DF38E8595472AB76ED17B9D2928E16FA987E3231C2A45D9BD52D9DC2CE7E4C394E2453518E6
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=LEikZe,_b,_tp,byfTOb,lsjVmc/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=n73qwf,SCuOPb,IZT63,vfuNJf,UUJqVe,ws9Tlc,siKnQd,XVq9Qb,STuCOe,njlZCf,m9oV,vjKJJ,y5vRwf,iyZMqd,NTMZac,mzzZzc,rCcCxc,vvMGie,NOeYWe,O6y8ed,L9OGUe,PrPYRd,MpJwZc,qPfo0c,cYShmd,hc6Ubd,Rkm0ef,KUM7Z,oLggrd,inNHtf,L1AAkb,WpP9Yc,lwddkf,gJzDyc,SpsfSb,aC1iue,tUnxGc,aW3pY,ZakeSe,EFQ78c,xQtZb,I6YDgd,zbML3c,zr1jrb,vHEMJe,YHI3We,YTxL4,bSspM,Uas9Hd,zy0vNb,K0PMbc,AvtSve,qmdT9,MY7mZe,xBaz7b,GwYlN,eVCnO,EIOG1e,LDQI"
                                                        Preview:"use strict";_F_installCss(".EE6QGf{border-bottom-style:solid;border-bottom-width:1px;padding:16px;width:100%;z-index:6;background:#fff;background:var(--gm3-sys-color-surface-container-lowest,#fff);border-color:#c4c7c5;border-color:var(--gm3-sys-color-outline-variant,#c4c7c5);display:block;position:relative}.EE6QGf~.S7xv8,.EE6QGf~.gfM9Zd{padding-top:inherit}@media (min-width:600px){.EE6QGf{align-items:center;display:flex;left:0;position:fixed;top:0}.EE6QGf~.S7xv8,.EE6QGf~.gfM9Zd{padding-top:150px}}@media (min-width:600px) and (orientation:landscape){.EE6QGf{display:block;position:relative}.EE6QGf~.S7xv8,.EE6QGf~.gfM9Zd{padding-top:inherit}}@media (min-width:960px) and (orientation:landscape){.EE6QGf{align-items:center;display:flex;left:0;position:fixed;top:0}.EE6QGf~.S7xv8,.EE6QGf~.gfM9Zd{padding-top:150px}}.PZB4Lc{display:flex;width:100%}.YLIzab{font-family:\"Google Sans\",roboto,\"Noto Sans Myanmar UI\",arial,sans-serif;font-size:1rem;font-weight:500;letter-spacing:0rem;line-height:1
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:downloaded
                                                        Size (bytes):84
                                                        Entropy (8bit):4.875266466142591
                                                        Encrypted:false
                                                        SSDEEP:3:DZFJu0+WVTBCq2Bjdw2KsJJuYHSKnZ:lFJuuVTBudw29nu4SKZ
                                                        MD5:87B6333E98B7620EA1FF98D1A837A39E
                                                        SHA1:105DE6815B0885357DE1414BFC0D77FCC9E924EF
                                                        SHA-256:DCD3C133C5C40BECD4100BBE6EDAE84C9735E778E4234A5E8395C56FF8A733BA
                                                        SHA-512:867D7943D813685FAA76394E53199750C55817E836FD19C933F74D11E9657CE66719A6D6B2E39EE1DE62358BCE364E38A55F4E138DF92337DE6985DDCD5D0994
                                                        Malicious:false
                                                        URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISHgmA6QC9dWevzxIFDRkBE_oSBQ3oIX6GEgUN05ioBw==?alt=proto
                                                        Preview:Cj0KBw0ZARP6GgAKKQ3oIX6GGgQISxgCKhwIClIYCg5AIS4jJF8qLSY/Ky8lLBABGP////8PCgcN05ioBxoA
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (522)
                                                        Category:downloaded
                                                        Size (bytes):5050
                                                        Entropy (8bit):5.289052544075544
                                                        Encrypted:false
                                                        SSDEEP:96:o4We0hP7OBFXYvB1sig3Fd8HkaXzLmUrv8Vh1WJlLQXT2v2gqw:655758Fd8HkaPZ0GmAD
                                                        MD5:26E26FD11772DFF5C7004BEA334289CC
                                                        SHA1:638DAAF541BDE31E95AEE4F8ADA677434D7051DB
                                                        SHA-256:ADFE3E4960982F5EF4C043052A9990D8683C5FC2B590E817B6B1A5774DDE2CE3
                                                        SHA-512:C31929EB6D1C60D6A84A2574FF60490394A6D6F9B354972F3328952F570D80B3F2AEC916B0E1B66DDB1AC056EB75BFAC477E7AF631D0AD1810EDBAF025465D66
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,ZwDk9d,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,iAskyc,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=wg1P6b"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.jNa=_.y("wg1P6b",[_.TA,_.Cn,_.Kn]);._.k("wg1P6b");.var Z5a;Z5a=_.mh(["aria-"]);._.uJ=function(a){_.X.call(this,a.Fa);this.Ka=this.wa=this.aa=this.viewportElement=this.Na=null;this.Hc=a.Ea.ff;this.ab=a.Ea.focus;this.Fc=a.Ea.Fc;this.ea=this.Pi();a=-1*parseInt(_.Co(this.Pi().el(),"marginTop")||"0",10);var b=parseInt(_.Co(this.Pi().el(),"marginBottom")||"0",10);this.Ta={top:a,right:0,bottom:b,left:0};a=_.cf(this.getData("isMenuDynamic"),!1);b=_.cf(this.getData("isMenuHoisted"),!1);this.Ga=a?1:b?2:0;this.ka=!1;this.Ca=1;this.Ga!==1&&(this.aa=this.Sa("U0exHf").children().Wc(0),_.ku(this,.$5a(this,this.aa.el())));_.kF(this.oa())&&(a=this.oa().el(),b=this.we.bind(this),a.__soy_skip_handler=b)};_.J(_.uJ,_.X);_.uJ.Ba=function(){return{Ea:{ff:_.ZE,focus:_.KE,Fc:_.ru}}};_.uJ.prototype.xF=function(a){var b=a.source;this.Na=b;var c;((c=a.data)==null?0:c.fz)?(a=a.data.fz,this.Ca=a==="MOUS
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (570)
                                                        Category:downloaded
                                                        Size (bytes):3467
                                                        Entropy (8bit):5.514745431912774
                                                        Encrypted:false
                                                        SSDEEP:96:ozbld2fNUmeqJNizhNtt1W8t//loyIpXmdVE2w:onSKE8PWe/Cy4X3j
                                                        MD5:8DEF399E8355ABC23E64505281005099
                                                        SHA1:24FF74C3AEFD7696D84FF148465DF4B1B60B1696
                                                        SHA-256:F128D7218E1286B05DF11310AD3C8F4CF781402698E45448850D2A3A22F5F185
                                                        SHA-512:33721DD47658D8E12ADF6BD9E9316EB89F5B6297927F7FD60F954E04B829DCBF0E1AE6DDD9A3401F45E0011AE4B1397B960C218238A3D0F633A2173D8E604082
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,ZwDk9d,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,iAskyc,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,wg1P6b,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=Wt6vjf,hhhU8,FCpbqb,WhJNk"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("Wt6vjf");.var cya=function(){var a=_.He();return _.Lj(a,1)},Yt=function(a){this.Da=_.t(a,0,Yt.messageId)};_.J(Yt,_.w);Yt.prototype.Ha=function(){return _.Dj(this,1)};Yt.prototype.Va=function(a){return _.Vj(this,1,a)};Yt.messageId="f.bo";var Zt=function(){_.hm.call(this)};_.J(Zt,_.hm);Zt.prototype.xd=function(){this.CT=!1;dya(this);_.hm.prototype.xd.call(this)};Zt.prototype.aa=function(){eya(this);if(this.wC)return fya(this),!1;if(!this.KV)return $t(this),!0;this.dispatchEvent("p");if(!this.zP)return $t(this),!0;this.wM?(this.dispatchEvent("r"),$t(this)):fya(this);return!1};.var gya=function(a){var b=new _.ap(a.W4);a.qQ!=null&&_.Jn(b,"authuser",a.qQ);return b},fya=function(a){a.wC=!0;var b=gya(a),c="rt=r&f_uid="+_.pk(a.zP);_.cn(b,(0,_.bg)(a.ea,a),"POST",c)};.Zt.prototype.ea=function(a){a=a.target;eya(this);if(_.fn(a)){this.cK=0;if(this.wM)this.wC=!1,this.dispatchEvent("r"
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (1694)
                                                        Category:downloaded
                                                        Size (bytes):32500
                                                        Entropy (8bit):5.378903546681047
                                                        Encrypted:false
                                                        SSDEEP:768:zYlbuROstb0e39nKGrkysU0smpu4OLOdzIf1p/5GeSsngurz6aKEEEGo/:zYl61Cysbu4OLOdzIfrIen72ZFo/
                                                        MD5:BF4BF9728A7C302FBA5B14F3D0F1878B
                                                        SHA1:2607CA7A93710D629400077FF3602CB207E6F53D
                                                        SHA-256:8981E7B228DF7D6A8797C0CD1E9B0F1F88337D5F0E1C27A04E7A57D2C4309798
                                                        SHA-512:AC9E170FC3AFDC0CF6BB8E926B93EF129A5FAD1BBA51B60BABCF3555E9B652E98F86A00FB099879DED35DD3FFE72ECFA597E20E6CA8CF402BEDEC40F78412EDA
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=_b,_tp/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=byfTOb,lsjVmc,LEikZe"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{.var Aua=function(a,b){this.da=a;this.ea=b;if(!c){var c=new _.ap("//www.google.com/images/cleardot.gif");_.op(c)}this.ka=c};_.h=Aua.prototype;_.h.Zc=null;_.h.lZ=1E4;_.h.bA=!1;_.h.nQ=0;_.h.zJ=null;_.h.bV=null;_.h.setTimeout=function(a){this.lZ=a};_.h.start=function(){if(this.bA)throw Error("dc");this.bA=!0;this.nQ=0;Bua(this)};_.h.stop=function(){Cua(this);this.bA=!1};.var Bua=function(a){a.nQ++;navigator!==null&&"onLine"in navigator&&!navigator.onLine?_.km((0,_.bg)(a.aH,a,!1),0):(a.aa=new Image,a.aa.onload=(0,_.bg)(a.Fja,a),a.aa.onerror=(0,_.bg)(a.Eja,a),a.aa.onabort=(0,_.bg)(a.Dja,a),a.zJ=_.km(a.Gja,a.lZ,a),a.aa.src=String(a.ka))};_.h=Aua.prototype;_.h.Fja=function(){this.aH(!0)};_.h.Eja=function(){this.aH(!1)};_.h.Dja=function(){this.aH(!1)};_.h.Gja=function(){this.aH(!1)};._.h.aH=function(a){Cua(this);a?(this.bA=!1,this.da.call(this.ea,!0)):this.nQ<=0?Bua(this):(this.bA=!1,
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):6.582233693166294
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:file.exe
                                                        File size:918'528 bytes
                                                        MD5:983a1a23eb06ef4323ee7a01425e47ef
                                                        SHA1:cbdbfb1f18152b7205e9b4a647b269fe0a413154
                                                        SHA256:c6b13a9fc461010cf268d60923813c067b7b2c382573f16d538067e8210ceba6
                                                        SHA512:0b6a58488a57d4af1c21ad6c7e276c7a48e6b112458f553fc7e2bac2503b5fc42431bc5381cf9adc8605967359623f0759fd868ffb3e26401591bc3d997e1c34
                                                        SSDEEP:12288:PqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDganTL:PqDEvCTbMWu7rQYlBQcBiT6rprG8aTL
                                                        TLSH:6A159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                                                        File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                        Icon Hash:aaf3e3e3938382a0
                                                        Entrypoint:0x420577
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x66FD7297 [Wed Oct 2 16:19:35 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:1
                                                        File Version Major:5
                                                        File Version Minor:1
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:1
                                                        Import Hash:948cc502fe9226992dce9417f952fce3
                                                        Instruction
                                                        call 00007FB47D13BE83h
                                                        jmp 00007FB47D13B78Fh
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        push dword ptr [ebp+08h]
                                                        mov esi, ecx
                                                        call 00007FB47D13B96Dh
                                                        mov dword ptr [esi], 0049FDF0h
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        and dword ptr [ecx+04h], 00000000h
                                                        mov eax, ecx
                                                        and dword ptr [ecx+08h], 00000000h
                                                        mov dword ptr [ecx+04h], 0049FDF8h
                                                        mov dword ptr [ecx], 0049FDF0h
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        push dword ptr [ebp+08h]
                                                        mov esi, ecx
                                                        call 00007FB47D13B93Ah
                                                        mov dword ptr [esi], 0049FE0Ch
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        and dword ptr [ecx+04h], 00000000h
                                                        mov eax, ecx
                                                        and dword ptr [ecx+08h], 00000000h
                                                        mov dword ptr [ecx+04h], 0049FE14h
                                                        mov dword ptr [ecx], 0049FE0Ch
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        mov esi, ecx
                                                        lea eax, dword ptr [esi+04h]
                                                        mov dword ptr [esi], 0049FDD0h
                                                        and dword ptr [eax], 00000000h
                                                        and dword ptr [eax+04h], 00000000h
                                                        push eax
                                                        mov eax, dword ptr [ebp+08h]
                                                        add eax, 04h
                                                        push eax
                                                        call 00007FB47D13E52Dh
                                                        pop ecx
                                                        pop ecx
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        lea eax, dword ptr [ecx+04h]
                                                        mov dword ptr [ecx], 0049FDD0h
                                                        push eax
                                                        call 00007FB47D13E578h
                                                        pop ecx
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        mov esi, ecx
                                                        lea eax, dword ptr [esi+04h]
                                                        mov dword ptr [esi], 0049FDD0h
                                                        push eax
                                                        call 00007FB47D13E561h
                                                        test byte ptr [ebp+08h], 00000001h
                                                        pop ecx
                                                        Programming Language:
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x9900.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0xd40000x99000x9a002b772f554bc4074376b7de80ff3b6982False0.3019226866883117data5.277448268855475IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                        RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                        RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                        RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                        RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                        RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                        RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                        RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                        RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                        RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                        RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                        RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                        RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                        RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                        RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                        RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                        RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                        RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                        RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                        RT_RCDATA0xdc7b80xbc6data1.0036496350364963
                                                        RT_GROUP_ICON0xdd3800x76dataEnglishGreat Britain0.6610169491525424
                                                        RT_GROUP_ICON0xdd3f80x14dataEnglishGreat Britain1.25
                                                        RT_GROUP_ICON0xdd40c0x14dataEnglishGreat Britain1.15
                                                        RT_GROUP_ICON0xdd4200x14dataEnglishGreat Britain1.25
                                                        RT_VERSION0xdd4340xdcdataEnglishGreat Britain0.6181818181818182
                                                        RT_MANIFEST0xdd5100x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                        DLLImport
                                                        WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                        VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                        MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                        WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                        PSAPI.DLLGetProcessMemoryInfo
                                                        IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                        USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                        UxTheme.dllIsThemeActive
                                                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                        USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                        GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                        COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                        SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                        OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishGreat Britain
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Oct 2, 2024 19:00:50.898499012 CEST49732443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:00:50.898551941 CEST44349732142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:00:50.898607969 CEST49732443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:00:50.899785042 CEST49732443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:00:50.899800062 CEST44349732142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:00:51.069084883 CEST49675443192.168.2.4173.222.162.32
                                                        Oct 2, 2024 19:00:51.551424026 CEST44349732142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:00:51.551942110 CEST49732443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:00:51.551959038 CEST44349732142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:00:51.552401066 CEST44349732142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:00:51.552462101 CEST49732443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:00:51.553390980 CEST44349732142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:00:51.553442001 CEST49732443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:00:51.557650089 CEST49732443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:00:51.557746887 CEST44349732142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:00:51.559902906 CEST49732443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:00:51.559923887 CEST44349732142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:00:51.600235939 CEST49732443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:00:51.852585077 CEST44349732142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:00:51.852688074 CEST44349732142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:00:51.852910042 CEST49732443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:00:51.853228092 CEST49732443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:00:51.853245020 CEST44349732142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:00:51.863426924 CEST49734443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:00:51.863482952 CEST44349734142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:00:51.863575935 CEST49734443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:00:51.863857985 CEST49734443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:00:51.863888979 CEST44349734142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:00:52.568443060 CEST44349734142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:00:52.582029104 CEST49734443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:00:52.582066059 CEST44349734142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:00:52.582649946 CEST44349734142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:00:52.582742929 CEST49734443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:00:52.583359003 CEST44349734142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:00:52.583415031 CEST49734443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:00:52.612472057 CEST49734443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:00:52.612641096 CEST49734443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:00:52.612649918 CEST44349734142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:00:52.659404039 CEST44349734142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:00:52.661525965 CEST49734443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:00:52.661572933 CEST44349734142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:00:52.708410025 CEST49734443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:00:52.915081978 CEST44349734142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:00:52.915164948 CEST49734443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:00:52.915188074 CEST44349734142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:00:52.915200949 CEST44349734142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:00:52.915255070 CEST49734443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:00:52.919553041 CEST49734443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:00:52.919565916 CEST44349734142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:00:55.222531080 CEST49740443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:00:55.222589970 CEST44349740172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:00:55.222652912 CEST49740443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:00:55.222839117 CEST49740443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:00:55.222855091 CEST44349740172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:00:55.883508921 CEST44349740172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:00:55.883734941 CEST49740443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:00:55.883763075 CEST44349740172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:00:55.884685993 CEST44349740172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:00:55.884751081 CEST49740443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:00:55.925347090 CEST49740443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:00:55.925508976 CEST44349740172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:00:55.975574017 CEST49740443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:00:55.975589037 CEST44349740172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:00:56.020895958 CEST49740443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:00:59.595680952 CEST49755443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:00:59.595719099 CEST44349755184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:00:59.595803976 CEST49755443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:00:59.598339081 CEST49755443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:00:59.598351955 CEST44349755184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:00:59.727281094 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:00:59.727324009 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:00:59.727395058 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:00:59.727828026 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:00:59.727838993 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.252151012 CEST44349755184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:01:00.252302885 CEST49755443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:01:00.366313934 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.392584085 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.392653942 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.393307924 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.393384933 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.394025087 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.394083977 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.398821115 CEST49755443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:01:00.398834944 CEST44349755184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:01:00.399805069 CEST44349755184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:01:00.438499928 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.438925028 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.439349890 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.439409971 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.451936960 CEST49755443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:01:00.486951113 CEST49755443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:01:00.488550901 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.531409025 CEST44349755184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:01:00.672152042 CEST44349755184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:01:00.672337055 CEST44349755184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:01:00.672398090 CEST49755443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:01:00.672507048 CEST49755443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:01:00.672507048 CEST49755443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:01:00.672528028 CEST44349755184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:01:00.672538042 CEST44349755184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:01:00.687371016 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.687545061 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.687611103 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.687644005 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.687695980 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.692981958 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.693104029 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.699189901 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.699276924 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.699296951 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.699347973 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.705423117 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.705490112 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.711653948 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.711724997 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.711752892 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.711813927 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.767782927 CEST49759443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:01:00.767867088 CEST44349759184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:01:00.767950058 CEST49759443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:01:00.768304110 CEST49759443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:01:00.768327951 CEST44349759184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:01:00.775548935 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.775621891 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.775665045 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.775712013 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.776019096 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.776072025 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.783473015 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.783540964 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.783565998 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.783617973 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.789338112 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.789400101 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.794596910 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.794660091 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.794682026 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.800853014 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.800904989 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.800918102 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.807559013 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.807614088 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.807631969 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.807888985 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:00.807950974 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.808015108 CEST49756443192.168.2.4142.250.185.78
                                                        Oct 2, 2024 19:01:00.808048964 CEST44349756142.250.185.78192.168.2.4
                                                        Oct 2, 2024 19:01:01.443876982 CEST44349759184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:01:01.443984985 CEST49759443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:01:01.452440977 CEST49759443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:01:01.452474117 CEST44349759184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:01:01.452769995 CEST44349759184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:01:01.453850985 CEST49759443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:01:01.495438099 CEST44349759184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:01:01.747569084 CEST44349759184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:01:01.747638941 CEST44349759184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:01:01.747703075 CEST49759443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:01:01.781202078 CEST49759443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:01:01.781233072 CEST44349759184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:01:01.781244993 CEST49759443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:01:01.781251907 CEST44349759184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:01:01.832036018 CEST49761443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:01.832091093 CEST44349761142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:01.832149029 CEST49761443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:01.832479000 CEST49761443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:01.832489967 CEST44349761142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:01.896907091 CEST49763443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:01.896956921 CEST44349763142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:01.897016048 CEST49763443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:01.916538000 CEST49763443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:01.916558981 CEST44349763142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.461762905 CEST44349761142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.468525887 CEST49761443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.468535900 CEST44349761142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.469187021 CEST44349761142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.469250917 CEST49761443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.470242023 CEST44349761142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.470305920 CEST49761443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.471451044 CEST49761443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.471539974 CEST44349761142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.472009897 CEST49761443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.472021103 CEST44349761142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.513377905 CEST49761443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.545026064 CEST44349763142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.546793938 CEST49763443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.546803951 CEST44349763142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.547195911 CEST44349763142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.547254086 CEST49763443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.548012972 CEST44349763142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.548064947 CEST49763443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.549513102 CEST49763443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.549582005 CEST44349763142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.556035042 CEST49763443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.556041956 CEST44349763142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.599534988 CEST49763443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.761703014 CEST44349761142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.762214899 CEST44349761142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.762269020 CEST49761443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.764193058 CEST49761443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.764215946 CEST44349761142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.766172886 CEST49765443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.766216993 CEST44349765142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.766292095 CEST49765443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.766813993 CEST49765443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.766832113 CEST44349765142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.843847036 CEST44349763142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.843966007 CEST44349763142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.844027996 CEST49763443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.873557091 CEST49763443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.873584032 CEST44349763142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.875680923 CEST49766443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.875725985 CEST44349766142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:02.875881910 CEST49766443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.876815081 CEST49766443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:02.876827002 CEST44349766142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.343283892 CEST49672443192.168.2.4173.222.162.32
                                                        Oct 2, 2024 19:01:03.343373060 CEST44349672173.222.162.32192.168.2.4
                                                        Oct 2, 2024 19:01:03.475723028 CEST44349765142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.476130962 CEST49765443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:03.476149082 CEST44349765142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.477699041 CEST44349765142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.477797985 CEST49765443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:03.478825092 CEST44349765142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.478884935 CEST49765443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:03.479157925 CEST49765443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:03.479218960 CEST44349765142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.479271889 CEST49765443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:03.479271889 CEST49765443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:03.479290962 CEST44349765142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.524370909 CEST49765443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:03.524379015 CEST44349765142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.560266972 CEST44349766142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.560519934 CEST49766443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:03.560532093 CEST44349766142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.560976028 CEST44349766142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.561036110 CEST49766443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:03.561731100 CEST44349766142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.561777115 CEST49766443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:03.561973095 CEST49766443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:03.562037945 CEST44349766142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.562150002 CEST49766443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:03.562160015 CEST44349766142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.562174082 CEST49766443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:03.571048021 CEST49765443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:03.602302074 CEST49766443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:03.602312088 CEST44349766142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.704380989 CEST44349765142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.704724073 CEST44349765142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.704778910 CEST49765443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:03.705657005 CEST49765443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:03.705677032 CEST44349765142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.783330917 CEST44349766142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.784457922 CEST44349766142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.784579992 CEST49766443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:03.785444021 CEST49766443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:03.785468102 CEST44349766142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:03.837894917 CEST49740443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:01:03.883404016 CEST44349740172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:01:04.160641909 CEST44349740172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:01:04.160712004 CEST44349740172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:01:04.160759926 CEST44349740172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:01:04.160785913 CEST49740443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:01:04.160805941 CEST44349740172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:01:04.160846949 CEST49740443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:01:04.160854101 CEST44349740172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:01:04.160957098 CEST44349740172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:01:04.161072016 CEST49740443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:01:04.167298079 CEST49740443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:01:04.167314053 CEST44349740172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:01:04.215734959 CEST49769443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:04.215842009 CEST443497694.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:04.215934038 CEST49769443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:04.221970081 CEST49769443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:04.222007036 CEST443497694.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:05.109705925 CEST443497694.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:05.109885931 CEST49769443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:05.219377041 CEST49769443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:05.219480038 CEST443497694.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:05.219851971 CEST443497694.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:05.264374971 CEST49769443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:06.244827032 CEST49769443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:06.287400007 CEST443497694.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:06.511349916 CEST443497694.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:06.511373997 CEST443497694.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:06.511380911 CEST443497694.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:06.511430025 CEST443497694.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:06.511440992 CEST49769443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:06.511491060 CEST443497694.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:06.511516094 CEST443497694.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:06.511574030 CEST49769443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:06.511574984 CEST49769443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:06.511594057 CEST443497694.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:06.511621952 CEST49769443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:06.511642933 CEST49769443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:06.511873007 CEST443497694.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:06.511938095 CEST443497694.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:06.511986971 CEST49769443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:07.210269928 CEST49769443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:07.210314035 CEST443497694.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:07.210333109 CEST49769443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:07.210344076 CEST443497694.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:08.727724075 CEST49775443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:08.727767944 CEST44349775142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:08.727890015 CEST49775443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:08.728210926 CEST49775443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:08.728224993 CEST44349775142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:09.542891026 CEST44349775142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:09.543320894 CEST49775443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:09.543351889 CEST44349775142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:09.543796062 CEST44349775142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:09.544090033 CEST49775443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:09.544173956 CEST44349775142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:09.544234991 CEST49775443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:09.544258118 CEST49775443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:09.544267893 CEST44349775142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:09.874568939 CEST44349775142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:09.875149965 CEST44349775142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:09.875211000 CEST49775443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:09.885853052 CEST49775443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:09.885895967 CEST44349775142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:32.087793112 CEST49782443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:32.087855101 CEST44349782142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:32.087943077 CEST49782443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:32.088172913 CEST49782443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:32.088191986 CEST44349782142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:32.723623037 CEST44349782142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:32.724097013 CEST49782443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:32.724114895 CEST44349782142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:32.724486113 CEST44349782142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:32.724780083 CEST49782443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:32.724837065 CEST44349782142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:32.724922895 CEST49782443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:32.724941015 CEST49782443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:32.724946976 CEST44349782142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:32.930612087 CEST49783443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:32.930705070 CEST44349783142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:32.930813074 CEST49783443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:32.931209087 CEST49783443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:32.931226969 CEST44349783142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:33.034229994 CEST44349782142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:33.034926891 CEST44349782142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:33.035000086 CEST49782443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:33.035161972 CEST49782443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:33.035180092 CEST44349782142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:33.165591955 CEST49784443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:33.165651083 CEST44349784142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:33.165750027 CEST49784443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:33.166479111 CEST49784443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:33.166493893 CEST44349784142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:33.594170094 CEST44349783142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:33.594516039 CEST49783443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:33.594578028 CEST44349783142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:33.595865965 CEST44349783142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:33.596519947 CEST49783443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:33.596714973 CEST44349783142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:33.596733093 CEST49783443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:33.596756935 CEST49783443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:33.596827984 CEST44349783142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:33.646248102 CEST49783443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:33.898339987 CEST44349783142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:33.899169922 CEST44349783142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:33.899260998 CEST49783443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:33.899399042 CEST49783443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:33.899442911 CEST44349783142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:33.987958908 CEST44349784142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:33.988713980 CEST49784443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:33.988743067 CEST44349784142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:33.989109993 CEST44349784142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:33.989522934 CEST49784443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:33.989592075 CEST44349784142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:33.989701033 CEST49784443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:33.989723921 CEST49784443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:33.989737034 CEST44349784142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:34.207262039 CEST44349784142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:34.207653999 CEST44349784142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:34.207732916 CEST49784443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:34.239334106 CEST49784443192.168.2.4142.250.185.174
                                                        Oct 2, 2024 19:01:34.239362955 CEST44349784142.250.185.174192.168.2.4
                                                        Oct 2, 2024 19:01:43.564158916 CEST49785443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:43.564208984 CEST443497854.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:43.564332008 CEST49785443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:43.564688921 CEST49785443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:43.564703941 CEST443497854.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:44.344053984 CEST443497854.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:44.344142914 CEST49785443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:44.351213932 CEST49785443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:44.351223946 CEST443497854.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:44.352202892 CEST443497854.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:44.360353947 CEST49785443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:44.403412104 CEST443497854.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:44.725258112 CEST443497854.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:44.725286961 CEST443497854.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:44.725305080 CEST443497854.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:44.725393057 CEST49785443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:44.725415945 CEST443497854.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:44.725471020 CEST49785443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:44.726257086 CEST443497854.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:44.726296902 CEST443497854.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:44.726319075 CEST49785443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:44.726325989 CEST443497854.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:44.726352930 CEST49785443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:44.726963997 CEST443497854.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:44.727029085 CEST49785443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:44.731017113 CEST49785443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:44.731031895 CEST443497854.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:44.731057882 CEST49785443192.168.2.44.175.87.197
                                                        Oct 2, 2024 19:01:44.731062889 CEST443497854.175.87.197192.168.2.4
                                                        Oct 2, 2024 19:01:55.225718975 CEST49787443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:01:55.225764036 CEST44349787172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:01:55.225863934 CEST49787443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:01:55.226099014 CEST49787443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:01:55.226114035 CEST44349787172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:01:55.880779982 CEST44349787172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:01:55.881612062 CEST49787443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:01:55.881633043 CEST44349787172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:01:55.882097006 CEST44349787172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:01:55.882359028 CEST49787443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:01:55.882440090 CEST44349787172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:01:55.929183006 CEST49787443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:02:02.900083065 CEST49789443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:02.900115967 CEST44349789216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:02.900180101 CEST49789443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:02.900424004 CEST49789443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:02.900437117 CEST44349789216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:03.556391001 CEST44349789216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:03.556688070 CEST49789443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:03.556704998 CEST44349789216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:03.558374882 CEST44349789216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:03.558778048 CEST49789443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:03.558836937 CEST49789443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:03.558842897 CEST44349789216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:03.558856964 CEST44349789216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:03.558859110 CEST49789443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:03.599112034 CEST49789443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:03.599117994 CEST44349789216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:03.857779980 CEST44349789216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:03.858982086 CEST44349789216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:03.859040976 CEST49789443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:03.859268904 CEST49789443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:03.859286070 CEST44349789216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:04.557351112 CEST49790443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:04.557382107 CEST44349790216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:04.557465076 CEST49790443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:04.557787895 CEST49790443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:04.557802916 CEST44349790216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:05.199815989 CEST44349790216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:05.200298071 CEST49790443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:05.200325012 CEST44349790216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:05.200650930 CEST44349790216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:05.201083899 CEST49790443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:05.201143980 CEST44349790216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:05.201286077 CEST49790443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:05.201353073 CEST49790443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:05.201359987 CEST44349790216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:05.507905006 CEST44349790216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:05.508217096 CEST44349790216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:05.508297920 CEST49790443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:05.508527040 CEST49790443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:05.508569956 CEST44349790216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:05.783701897 CEST44349787172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:02:05.783879995 CEST44349787172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:02:05.783927917 CEST49787443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:02:19.319885015 CEST49787443192.168.2.4172.217.23.100
                                                        Oct 2, 2024 19:02:19.319921017 CEST44349787172.217.23.100192.168.2.4
                                                        Oct 2, 2024 19:02:32.880994081 CEST49792443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:32.881050110 CEST44349792216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:32.881177902 CEST49792443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:32.881846905 CEST49792443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:32.881861925 CEST44349792216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:33.521349907 CEST44349792216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:33.538386106 CEST49792443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:33.538420916 CEST44349792216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:33.539721966 CEST44349792216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:33.549936056 CEST49792443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:33.550096989 CEST49792443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:33.550101995 CEST44349792216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:33.550117970 CEST49792443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:33.550127029 CEST44349792216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:33.591423988 CEST44349792216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:33.599826097 CEST49792443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:33.823932886 CEST44349792216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:33.824286938 CEST44349792216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:33.824350119 CEST49792443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:33.824511051 CEST49792443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:33.824526072 CEST44349792216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:36.698565006 CEST49793443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:36.698615074 CEST44349793216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:36.698697090 CEST49793443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:36.699129105 CEST49793443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:36.699143887 CEST44349793216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:37.497634888 CEST44349793216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:37.498145103 CEST49793443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:37.498167992 CEST44349793216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:37.499078035 CEST44349793216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:37.499504089 CEST49793443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:37.499572039 CEST44349793216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:37.499696016 CEST49793443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:37.499717951 CEST49793443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:37.499732018 CEST44349793216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:37.797348022 CEST44349793216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:37.798361063 CEST44349793216.58.206.78192.168.2.4
                                                        Oct 2, 2024 19:02:37.798424006 CEST49793443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:37.798754930 CEST49793443192.168.2.4216.58.206.78
                                                        Oct 2, 2024 19:02:37.798775911 CEST44349793216.58.206.78192.168.2.4
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Oct 2, 2024 19:00:50.874485016 CEST53648831.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:00:50.874564886 CEST5949153192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:00:50.874741077 CEST6288053192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:00:50.882329941 CEST53594911.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:00:50.882652044 CEST53628801.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:00:50.883830070 CEST53583951.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:00:51.855597019 CEST5528853192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:00:51.855767012 CEST5657653192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:00:51.862611055 CEST53565761.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:00:51.862627983 CEST53552881.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:00:51.909847975 CEST53580621.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:00:55.176172018 CEST5981953192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:00:55.176172018 CEST5038353192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:00:55.183310986 CEST53503831.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:00:55.195928097 CEST53598191.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:00:57.399734020 CEST53493001.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:00:59.718614101 CEST5474453192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:00:59.718799114 CEST4977953192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:00:59.725483894 CEST53547441.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:00:59.726516962 CEST53497791.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:01:01.823766947 CEST5355153192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:01:01.823899031 CEST5973153192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:01:01.830883026 CEST53597311.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:01:01.831181049 CEST53535511.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:01:04.208775043 CEST138138192.168.2.4192.168.2.255
                                                        Oct 2, 2024 19:01:08.915172100 CEST53566201.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:01:11.623591900 CEST53510621.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:01:27.702934027 CEST53496551.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:01:50.528521061 CEST53526151.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:01:50.528546095 CEST53523581.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:02:01.814846039 CEST53510771.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:02:02.723546982 CEST5876853192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:02:02.723728895 CEST6397353192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:02:02.899522066 CEST53639731.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:02:02.899535894 CEST53587681.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:02:19.328676939 CEST53554151.1.1.1192.168.2.4
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Oct 2, 2024 19:00:50.874564886 CEST192.168.2.41.1.1.10x9ba2Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:50.874741077 CEST192.168.2.41.1.1.10x132Standard query (0)youtube.com65IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.855597019 CEST192.168.2.41.1.1.10xba1bStandard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.855767012 CEST192.168.2.41.1.1.10xdd45Standard query (0)www.youtube.com65IN (0x0001)false
                                                        Oct 2, 2024 19:00:55.176172018 CEST192.168.2.41.1.1.10xd827Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:55.176172018 CEST192.168.2.41.1.1.10x5d82Standard query (0)www.google.com65IN (0x0001)false
                                                        Oct 2, 2024 19:00:59.718614101 CEST192.168.2.41.1.1.10xf830Standard query (0)accounts.youtube.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:59.718799114 CEST192.168.2.41.1.1.10x5225Standard query (0)accounts.youtube.com65IN (0x0001)false
                                                        Oct 2, 2024 19:01:01.823766947 CEST192.168.2.41.1.1.10x5477Standard query (0)play.google.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:01:01.823899031 CEST192.168.2.41.1.1.10xc81aStandard query (0)play.google.com65IN (0x0001)false
                                                        Oct 2, 2024 19:02:02.723546982 CEST192.168.2.41.1.1.10xe61fStandard query (0)play.google.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:02:02.723728895 CEST192.168.2.41.1.1.10x2645Standard query (0)play.google.com65IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Oct 2, 2024 19:00:50.882329941 CEST1.1.1.1192.168.2.40x9ba2No error (0)youtube.com142.250.185.78A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:50.882652044 CEST1.1.1.1192.168.2.40x132No error (0)youtube.com65IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.862611055 CEST1.1.1.1192.168.2.40xdd45No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.862611055 CEST1.1.1.1192.168.2.40xdd45No error (0)youtube-ui.l.google.com65IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.862627983 CEST1.1.1.1192.168.2.40xba1bNo error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.862627983 CEST1.1.1.1192.168.2.40xba1bNo error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.862627983 CEST1.1.1.1192.168.2.40xba1bNo error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.862627983 CEST1.1.1.1192.168.2.40xba1bNo error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.862627983 CEST1.1.1.1192.168.2.40xba1bNo error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.862627983 CEST1.1.1.1192.168.2.40xba1bNo error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.862627983 CEST1.1.1.1192.168.2.40xba1bNo error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.862627983 CEST1.1.1.1192.168.2.40xba1bNo error (0)youtube-ui.l.google.com216.58.212.142A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.862627983 CEST1.1.1.1192.168.2.40xba1bNo error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.862627983 CEST1.1.1.1192.168.2.40xba1bNo error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.862627983 CEST1.1.1.1192.168.2.40xba1bNo error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.862627983 CEST1.1.1.1192.168.2.40xba1bNo error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.862627983 CEST1.1.1.1192.168.2.40xba1bNo error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.862627983 CEST1.1.1.1192.168.2.40xba1bNo error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.862627983 CEST1.1.1.1192.168.2.40xba1bNo error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.862627983 CEST1.1.1.1192.168.2.40xba1bNo error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:51.862627983 CEST1.1.1.1192.168.2.40xba1bNo error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:55.183310986 CEST1.1.1.1192.168.2.40x5d82No error (0)www.google.com65IN (0x0001)false
                                                        Oct 2, 2024 19:00:55.195928097 CEST1.1.1.1192.168.2.40xd827No error (0)www.google.com172.217.23.100A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:59.725483894 CEST1.1.1.1192.168.2.40xf830No error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 2, 2024 19:00:59.725483894 CEST1.1.1.1192.168.2.40xf830No error (0)www3.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:00:59.726516962 CEST1.1.1.1192.168.2.40x5225No error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 2, 2024 19:01:01.831181049 CEST1.1.1.1192.168.2.40x5477No error (0)play.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:02:02.899535894 CEST1.1.1.1192.168.2.40xe61fNo error (0)play.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                        • youtube.com
                                                        • www.youtube.com
                                                        • https:
                                                          • accounts.youtube.com
                                                          • play.google.com
                                                          • www.google.com
                                                        • fs.microsoft.com
                                                        • slscr.update.microsoft.com
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.449732142.250.185.784436360C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:00:51 UTC851OUTGET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1
                                                        Host: youtube.com
                                                        Connection: keep-alive
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Upgrade-Insecure-Requests: 1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiTocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: none
                                                        Sec-Fetch-Mode: navigate
                                                        Sec-Fetch-User: ?1
                                                        Sec-Fetch-Dest: document
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 17:00:51 UTC1704INHTTP/1.1 301 Moved Permanently
                                                        Content-Type: application/binary
                                                        X-Content-Type-Options: nosniff
                                                        Expires: Wed, 02 Oct 2024 17:00:51 GMT
                                                        Date: Wed, 02 Oct 2024 17:00:51 GMT
                                                        Cache-Control: private, max-age=31536000
                                                        Location: https://www.youtube.com/account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd
                                                        X-Frame-Options: SAMEORIGIN
                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                        Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                                                        Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                                                        Content-Security-Policy: require-trusted-types-for 'script'
                                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                        Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Server: ESF
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.449734142.250.185.1424436360C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:00:52 UTC869OUTGET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1
                                                        Host: www.youtube.com
                                                        Connection: keep-alive
                                                        Upgrade-Insecure-Requests: 1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiTocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: none
                                                        Sec-Fetch-Mode: navigate
                                                        Sec-Fetch-User: ?1
                                                        Sec-Fetch-Dest: document
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 17:00:52 UTC2634INHTTP/1.1 303 See Other
                                                        Content-Type: application/binary
                                                        X-Content-Type-Options: nosniff
                                                        Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                        Pragma: no-cache
                                                        Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                        Date: Wed, 02 Oct 2024 17:00:52 GMT
                                                        Location: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%253F%253Dhttps%25253A%25252F%25252Faccounts.google.com%25252Fv3%25252Fsignin%25252Fchallenge%25252Fpwd%26feature%3Dredirect_login&hl=en
                                                        X-Frame-Options: SAMEORIGIN
                                                        Strict-Transport-Security: max-age=31536000
                                                        Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                                                        Content-Security-Policy: require-trusted-types-for 'script'
                                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                                                        Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                        P3P: CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657?hl=en for more info."
                                                        Server: ESF
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        Set-Cookie: GPS=1; Domain=.youtube.com; Expires=Wed, 02-Oct-2024 17:30:52 GMT; Path=/; Secure; HttpOnly
                                                        Set-Cookie: YSC=lEgds9_qXGg; Domain=.youtube.com; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                        Set-Cookie: VISITOR_INFO1_LIVE=PGKimWXImnE; Domain=.youtube.com; Expires=Mon, 31-Mar-2025 17:00:52 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                        Set-Cookie: VISITOR_PRIVACY_METADATA=CgJVUxIEGgAgTw%3D%3D; Domain=.youtube.com; Expires=Mon, 31-Mar-2025 17:00:52 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.449756142.250.185.784436360C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:01:00 UTC1235OUTGET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=555306652&timestamp=1727888458918 HTTP/1.1
                                                        Host: accounts.youtube.com
                                                        Connection: keep-alive
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-platform: "Windows"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        Upgrade-Insecure-Requests: 1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiTocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: cross-site
                                                        Sec-Fetch-Mode: navigate
                                                        Sec-Fetch-User: ?1
                                                        Sec-Fetch-Dest: iframe
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 17:01:00 UTC1969INHTTP/1.1 200 OK
                                                        Content-Type: text/html; charset=utf-8
                                                        X-Frame-Options: ALLOW-FROM https://accounts.google.com
                                                        Content-Security-Policy: frame-ancestors https://accounts.google.com
                                                        Content-Security-Policy: script-src 'report-sample' 'nonce-foKYC8jSKTgs0LzMa4Msyw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport;worker-src 'self'
                                                        Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport/allowlist
                                                        Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport
                                                        Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                        Pragma: no-cache
                                                        Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                        Date: Wed, 02 Oct 2024 17:01:00 GMT
                                                        Cross-Origin-Opener-Policy: same-origin
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                        reporting-endpoints: default="/_/AccountsDomainCookiesCheckConnectionHttp/web-reports?context=eJzjstDikmJw05BikPj6kkkDiJ3SZ7AGAXHSv_OsRUB8ufsS63UgVu25xGoKxEUSV1ibgFiIh-PMj6_b2QQ2LLoygUlJLym_MD4zJTWvJLOkMiU_NzEzLzk_Pzsztbg4tagstSjeyMDIxMDSyEjPwCK-wAAA8pMt1Q"
                                                        Server: ESF
                                                        X-XSS-Protection: 0
                                                        X-Content-Type-Options: nosniff
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 17:01:00 UTC1969INData Raw: 37 36 31 39 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 20 6e 6f 6e 63 65 3d 22 66 6f 4b 59 43 38 6a 53 4b 54 67 73 30 4c 7a 4d 61 34 4d 73 79 77 22 3e 22 75 73 65 20 73 74 72 69 63 74 22 3b 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 3d 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 7c 7c 7b 7d 3b 28 66 75 6e 63 74 69 6f 6e 28 5f 29 7b 76 61 72 20 77 69 6e 64 6f 77 3d 74 68 69 73 3b 0a 74 72 79 7b 0a 5f 2e 5f 46 5f 74 6f 67 67 6c 65 73 5f 69 6e 69 74 69 61 6c 69 7a 65 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 28 74 79 70 65 6f
                                                        Data Ascii: 7619<html><head><script nonce="foKYC8jSKTgs0LzMa4Msyw">"use strict";this.default_AccountsDomaincookiesCheckconnectionJs=this.default_AccountsDomaincookiesCheckconnectionJs||{};(function(_){var window=this;try{_._F_toggles_initialize=function(a){(typeo
                                                        2024-10-02 17:01:00 UTC1969INData Raw: 54 72 69 64 65 6e 74 5c 2f 28 5c 64 2e 5c 64 29 2f 2e 65 78 65 63 28 62 29 2c 0a 63 5b 31 5d 3d 3d 22 37 2e 30 22 29 69 66 28 62 26 26 62 5b 31 5d 29 73 77 69 74 63 68 28 62 5b 31 5d 29 7b 63 61 73 65 20 22 34 2e 30 22 3a 61 3d 22 38 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 35 2e 30 22 3a 61 3d 22 39 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 36 2e 30 22 3a 61 3d 22 31 30 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 37 2e 30 22 3a 61 3d 22 31 31 2e 30 22 7d 65 6c 73 65 20 61 3d 22 37 2e 30 22 3b 65 6c 73 65 20 61 3d 63 5b 31 5d 3b 62 3d 61 7d 65 6c 73 65 20 62 3d 22 22 3b 72 65 74 75 72 6e 20 62 7d 76 61 72 20 64 3d 52 65 67 45 78 70 28 22 28 5b 41 2d 5a 5d 5b 5c 5c 77 20 5d 2b 29 2f 28 5b 5e 5c 5c 73 5d 2b 29 5c 5c 73 2a 28 3f 3a 5c 5c 28
                                                        Data Ascii: Trident\/(\d.\d)/.exec(b),c[1]=="7.0")if(b&&b[1])switch(b[1]){case "4.0":a="8.0";break;case "5.0":a="9.0";break;case "6.0":a="10.0";break;case "7.0":a="11.0"}else a="7.0";else a=c[1];b=a}else b="";return b}var d=RegExp("([A-Z][\\w ]+)/([^\\s]+)\\s*(?:\\(
                                                        2024-10-02 17:01:00 UTC1969INData Raw: 74 63 68 28 74 79 70 65 6f 66 20 61 29 7b 63 61 73 65 20 22 6e 75 6d 62 65 72 22 3a 72 65 74 75 72 6e 20 69 73 46 69 6e 69 74 65 28 61 29 3f 61 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 69 67 69 6e 74 22 3a 72 65 74 75 72 6e 28 41 61 3f 0a 61 3e 3d 42 61 26 26 61 3c 3d 43 61 3a 61 5b 30 5d 3d 3d 3d 22 2d 22 3f 75 61 28 61 2c 44 61 29 3a 75 61 28 61 2c 45 61 29 29 3f 4e 75 6d 62 65 72 28 61 29 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 72 65 74 75 72 6e 20 61 3f 31 3a 30 3b 63 61 73 65 20 22 6f 62 6a 65 63 74 22 3a 69 66 28 61 29 69 66 28 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 61 29 29 7b 69 66 28 43 28 61 29 29 72 65 74 75 72 6e 7d 65 6c 73 65 20 69 66 28 46 61 26 26 61 21 3d 6e 75 6c 6c 26 26 61 20 69 6e
                                                        Data Ascii: tch(typeof a){case "number":return isFinite(a)?a:String(a);case "bigint":return(Aa?a>=Ba&&a<=Ca:a[0]==="-"?ua(a,Da):ua(a,Ea))?Number(a):String(a);case "boolean":return a?1:0;case "object":if(a)if(Array.isArray(a)){if(C(a))return}else if(Fa&&a!=null&&a in
                                                        2024-10-02 17:01:00 UTC1969INData Raw: 7b 76 61 72 20 62 3b 69 66 28 61 26 26 28 62 3d 51 61 29 21 3d 6e 75 6c 6c 26 26 62 2e 68 61 73 28 61 29 26 26 28 62 3d 61 2e 43 29 29 66 6f 72 28 76 61 72 20 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 62 5b 63 5d 3b 69 66 28 63 3d 3d 3d 62 2e 6c 65 6e 67 74 68 2d 31 26 26 41 28 64 29 29 66 6f 72 28 76 61 72 20 65 20 69 6e 20 64 29 7b 76 61 72 20 66 3d 64 5b 65 5d 3b 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 66 29 26 26 0a 52 61 28 66 2c 61 29 7d 65 6c 73 65 20 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 64 29 26 26 52 61 28 64 2c 61 29 7d 61 3d 45 3f 61 2e 43 3a 4d 61 28 61 2e 43 2c 50 61 2c 76 6f 69 64 20 30 2c 76 6f 69 64 20 30 2c 21 31 29 3b 65 3d 21 45 3b 69 66 28 62 3d 61 2e 6c 65 6e 67 74 68 29 7b 64 3d 61 5b 62 2d
                                                        Data Ascii: {var b;if(a&&(b=Qa)!=null&&b.has(a)&&(b=a.C))for(var c=0;c<b.length;c++){var d=b[c];if(c===b.length-1&&A(d))for(var e in d){var f=d[e];Array.isArray(f)&&Ra(f,a)}else Array.isArray(d)&&Ra(d,a)}a=E?a.C:Ma(a.C,Pa,void 0,void 0,!1);e=!E;if(b=a.length){d=a[b-
                                                        2024-10-02 17:01:00 UTC1969INData Raw: 6f 6c 2e 69 74 65 72 61 74 6f 72 22 2c 66 75 6e 63 74 69 6f 6e 28 61 29 7b 69 66 28 61 29 72 65 74 75 72 6e 20 61 3b 61 3d 53 79 6d 62 6f 6c 28 22 63 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 22 41 72 72 61 79 20 49 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 43 6c 61 6d 70 65 64 41 72 72 61 79 20 49 6e 74 31 36 41 72 72 61 79 20 55 69 6e 74 31 36 41 72 72 61 79 20 49 6e 74 33 32 41 72 72 61 79 20 55 69 6e 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 36 34 41 72 72 61 79 22 2e 73 70 6c 69 74 28 22 20 22 29 2c 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 57 61 5b 62 5b 63 5d 5d 3b 74 79 70 65 6f 66 20 64 3d 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 26 26 74 79 70 65
                                                        Data Ascii: ol.iterator",function(a){if(a)return a;a=Symbol("c");for(var b="Array Int8Array Uint8Array Uint8ClampedArray Int16Array Uint16Array Int32Array Uint32Array Float32Array Float64Array".split(" "),c=0;c<b.length;c++){var d=Wa[b[c]];typeof d==="function"&&type
                                                        2024-10-02 17:01:00 UTC1969INData Raw: 29 3b 65 28 22 66 72 65 65 7a 65 22 29 3b 65 28 22 70 72 65 76 65 6e 74 45 78 74 65 6e 73 69 6f 6e 73 22 29 3b 65 28 22 73 65 61 6c 22 29 3b 76 61 72 20 68 3d 30 2c 67 3d 66 75 6e 63 74 69 6f 6e 28 6b 29 7b 74 68 69 73 2e 67 3d 28 68 2b 3d 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2b 31 29 2e 74 6f 53 74 72 69 6e 67 28 29 3b 69 66 28 6b 29 7b 6b 3d 48 28 6b 29 3b 66 6f 72 28 76 61 72 20 6c 3b 21 28 6c 3d 6b 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6c 3d 6c 2e 76 61 6c 75 65 2c 74 68 69 73 2e 73 65 74 28 6c 5b 30 5d 2c 6c 5b 31 5d 29 7d 7d 3b 67 2e 70 72 6f 74 6f 74 79 70 65 2e 73 65 74 3d 66 75 6e 63 74 69 6f 6e 28 6b 2c 6c 29 7b 69 66 28 21 63 28 6b 29 29 74 68 72 6f 77 20 45 72 72 6f 72 28 22 69 22 29 3b 64 28 6b 29 3b 69 66 28 21 49 28 6b 2c 66 29 29
                                                        Data Ascii: );e("freeze");e("preventExtensions");e("seal");var h=0,g=function(k){this.g=(h+=Math.random()+1).toString();if(k){k=H(k);for(var l;!(l=k.next()).done;)l=l.value,this.set(l[0],l[1])}};g.prototype.set=function(k,l){if(!c(k))throw Error("i");d(k);if(!I(k,f))
                                                        2024-10-02 17:01:00 UTC1969INData Raw: 75 72 6e 20 67 2e 76 61 6c 75 65 7d 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 2e 66 6f 72 45 61 63 68 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 66 6f 72 28 76 61 72 20 6c 3d 74 68 69 73 2e 65 6e 74 72 69 65 73 28 29 2c 6d 3b 21 28 6d 3d 6c 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6d 3d 0a 6d 2e 76 61 6c 75 65 2c 67 2e 63 61 6c 6c 28 6b 2c 6d 5b 31 5d 2c 6d 5b 30 5d 2c 74 68 69 73 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 5b 53 79 6d 62 6f 6c 2e 69 74 65 72 61 74 6f 72 5d 3d 63 2e 70 72 6f 74 6f 74 79 70 65 2e 65 6e 74 72 69 65 73 3b 76 61 72 20 64 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 76 61 72 20 6c 3d 6b 26 26 74 79 70 65 6f 66 20 6b 3b 6c 3d 3d 22 6f 62 6a 65 63 74 22 7c 7c 6c 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 3f 62 2e 68 61 73 28 6b 29
                                                        Data Ascii: urn g.value})};c.prototype.forEach=function(g,k){for(var l=this.entries(),m;!(m=l.next()).done;)m=m.value,g.call(k,m[1],m[0],this)};c.prototype[Symbol.iterator]=c.prototype.entries;var d=function(g,k){var l=k&&typeof k;l=="object"||l=="function"?b.has(k)
                                                        2024-10-02 17:01:00 UTC1969INData Raw: 6f 6e 28 61 29 7b 72 65 74 75 72 6e 20 61 3f 61 3a 66 75 6e 63 74 69 6f 6e 28 62 29 7b 72 65 74 75 72 6e 20 74 79 70 65 6f 66 20 62 3d 3d 3d 22 6e 75 6d 62 65 72 22 26 26 69 73 4e 61 4e 28 62 29 7d 7d 29 3b 76 61 72 20 66 62 3d 66 62 7c 7c 7b 7d 2c 71 3d 74 68 69 73 7c 7c 73 65 6c 66 2c 67 62 3d 71 2e 5f 46 5f 74 6f 67 67 6c 65 73 7c 7c 5b 5d 2c 68 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 61 3d 61 2e 73 70 6c 69 74 28 22 2e 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 71 2c 63 3d 30 3b 63 3c 61 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 69 66 28 62 3d 62 5b 61 5b 63 5d 5d 2c 62 3d 3d 6e 75 6c 6c 29 72 65 74 75 72 6e 20 6e 75 6c 6c 3b 72 65 74 75 72 6e 20 62 7d 2c 69 62 3d 22 63 6c 6f 73 75 72 65 5f 75 69 64 5f 22 2b 28 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2a 31 45
                                                        Data Ascii: on(a){return a?a:function(b){return typeof b==="number"&&isNaN(b)}});var fb=fb||{},q=this||self,gb=q._F_toggles||[],hb=function(a){a=a.split(".");for(var b=q,c=0;c<a.length;c++)if(b=b[a[c]],b==null)return null;return b},ib="closure_uid_"+(Math.random()*1E
                                                        2024-10-02 17:01:00 UTC1969INData Raw: 74 65 78 74 5f 5f 39 38 34 33 38 32 3d 7b 7d 29 3b 61 2e 5f 5f 63 6c 6f 73 75 72 65 5f 5f 65 72 72 6f 72 5f 5f 63 6f 6e 74 65 78 74 5f 5f 39 38 34 33 38 32 2e 73 65 76 65 72 69 74 79 3d 62 7d 3b 76 61 72 20 71 62 3d 66 75 6e 63 74 69 6f 6e 28 61 2c 62 2c 63 29 7b 63 3d 63 7c 7c 71 3b 76 61 72 20 64 3d 63 2e 6f 6e 65 72 72 6f 72 2c 65 3d 21 21 62 3b 63 2e 6f 6e 65 72 72 6f 72 3d 66 75 6e 63 74 69 6f 6e 28 66 2c 68 2c 67 2c 6b 2c 6c 29 7b 64 26 26 64 28 66 2c 68 2c 67 2c 6b 2c 6c 29 3b 61 28 7b 6d 65 73 73 61 67 65 3a 66 2c 66 69 6c 65 4e 61 6d 65 3a 68 2c 6c 69 6e 65 3a 67 2c 6c 69 6e 65 4e 75 6d 62 65 72 3a 67 2c 63 61 3a 6b 2c 65 72 72 6f 72 3a 6c 7d 29 3b 72 65 74 75 72 6e 20 65 7d 7d 2c 74 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 76 61 72 20 62 3d 68
                                                        Data Ascii: text__984382={});a.__closure__error__context__984382.severity=b};var qb=function(a,b,c){c=c||q;var d=c.onerror,e=!!b;c.onerror=function(f,h,g,k,l){d&&d(f,h,g,k,l);a({message:f,fileName:h,line:g,lineNumber:g,ca:k,error:l});return e}},tb=function(a){var b=h
                                                        2024-10-02 17:01:00 UTC1969INData Raw: 22 6e 75 6d 62 65 72 22 3a 66 3d 53 74 72 69 6e 67 28 66 29 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 66 3d 66 3f 22 74 72 75 65 22 3a 22 66 61 6c 73 65 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 66 75 6e 63 74 69 6f 6e 22 3a 66 3d 28 66 3d 73 62 28 66 29 29 3f 66 3a 22 5b 66 6e 5d 22 3b 62 72 65 61 6b 3b 64 65 66 61 75 6c 74 3a 66 3d 0a 74 79 70 65 6f 66 20 66 7d 66 2e 6c 65 6e 67 74 68 3e 34 30 26 26 28 66 3d 66 2e 73 6c 69 63 65 28 30 2c 34 30 29 2b 22 2e 2e 2e 22 29 3b 63 2e 70 75 73 68 28 66 29 7d 62 2e 70 75 73 68 28 61 29 3b 63 2e 70 75 73 68 28 22 29 5c 6e 22 29 3b 74 72 79 7b 63 2e 70 75 73 68 28 77 62 28 61 2e 63 61 6c 6c 65 72 2c 62 29 29 7d 63 61 74 63 68 28 68 29 7b 63 2e 70 75 73 68 28 22 5b 65 78 63 65 70 74 69 6f 6e
                                                        Data Ascii: "number":f=String(f);break;case "boolean":f=f?"true":"false";break;case "function":f=(f=sb(f))?f:"[fn]";break;default:f=typeof f}f.length>40&&(f=f.slice(0,40)+"...");c.push(f)}b.push(a);c.push(")\n");try{c.push(wb(a.caller,b))}catch(h){c.push("[exception


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.449755184.28.90.27443
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:01:00 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        Accept-Encoding: identity
                                                        User-Agent: Microsoft BITS/7.8
                                                        Host: fs.microsoft.com
                                                        2024-10-02 17:01:00 UTC466INHTTP/1.1 200 OK
                                                        Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                        Content-Type: application/octet-stream
                                                        ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                        Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                        Server: ECAcc (lpl/EF06)
                                                        X-CID: 11
                                                        X-Ms-ApiVersion: Distribute 1.2
                                                        X-Ms-Region: prod-neu-z1
                                                        Cache-Control: public, max-age=85490
                                                        Date: Wed, 02 Oct 2024 17:01:00 GMT
                                                        Connection: close
                                                        X-CID: 2


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.449759184.28.90.27443
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:01:01 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        Accept-Encoding: identity
                                                        If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                                                        Range: bytes=0-2147483646
                                                        User-Agent: Microsoft BITS/7.8
                                                        Host: fs.microsoft.com
                                                        2024-10-02 17:01:01 UTC514INHTTP/1.1 200 OK
                                                        ApiVersion: Distribute 1.1
                                                        Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                        Content-Type: application/octet-stream
                                                        ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                        Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                        Server: ECAcc (lpl/EF06)
                                                        X-CID: 11
                                                        X-Ms-ApiVersion: Distribute 1.2
                                                        X-Ms-Region: prod-weu-z1
                                                        Cache-Control: public, max-age=85433
                                                        Date: Wed, 02 Oct 2024 17:01:01 GMT
                                                        Content-Length: 55
                                                        Connection: close
                                                        X-CID: 2
                                                        2024-10-02 17:01:01 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                                                        Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.449761142.250.185.1744436360C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:01:02 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Accept: */*
                                                        Access-Control-Request-Method: POST
                                                        Access-Control-Request-Headers: x-goog-authuser
                                                        Origin: https://accounts.google.com
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 17:01:02 UTC520INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                        Access-Control-Max-Age: 86400
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 17:01:02 GMT
                                                        Server: Playlog
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.449763142.250.185.1744436360C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:01:02 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Accept: */*
                                                        Access-Control-Request-Method: POST
                                                        Access-Control-Request-Headers: x-goog-authuser
                                                        Origin: https://accounts.google.com
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 17:01:02 UTC520INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                        Access-Control-Max-Age: 86400
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 17:01:02 GMT
                                                        Server: Playlog
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.449765142.250.185.1744436360C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:01:03 UTC1124OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 505
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiTocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 17:01:03 UTC505OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 38 34 36 31 30 32 37 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727888461027",null,null,null
                                                        2024-10-02 17:01:03 UTC932INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=PtTTqr4ITDZpG_xcFdMyvOqLCTL1YLgJsmwzoSsxFpANmAj6LkWzmO8M7dM0K9T1g2OjjE7k8_3apY4Q5raIVIPfLqvZaQuhFen2mXZqMYO8YS04WDx5QpvHQTOclKtr_jWm9lNmjWdah_4nSe2sL8ZYpIkmYi2xY8R9A-YgXqjtrWTwZw; expires=Thu, 03-Apr-2025 17:01:03 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 17:01:03 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Wed, 02 Oct 2024 17:01:03 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 17:01:03 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 17:01:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        8192.168.2.449766142.250.185.1744436360C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:01:03 UTC1124OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 519
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiTocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 17:01:03 UTC519OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 38 34 36 31 31 30 31 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727888461101",null,null,null
                                                        2024-10-02 17:01:03 UTC932INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=K0eKjaNklXRZ50lSgNrYReWzWA-fsxRiO0RMxlvwkCQ-ug_yL0-9pnttPLyBXSW_1lG0-I4niidVESLRLVXm2mThCQdIkwPXuF30HhtSVKqM7TbAkPdQZqDHCsTTG-4D5a071Cll6VGx9FWmo6b2GtxwDR5mcjZx-sW5vc9wJy3T63FWwg; expires=Thu, 03-Apr-2025 17:01:03 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 17:01:03 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Wed, 02 Oct 2024 17:01:03 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 17:01:03 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 17:01:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        9192.168.2.449740172.217.23.1004436360C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:01:03 UTC1213OUTGET /favicon.ico HTTP/1.1
                                                        Host: www.google.com
                                                        Connection: keep-alive
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiTocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: no-cors
                                                        Sec-Fetch-Dest: image
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=K0eKjaNklXRZ50lSgNrYReWzWA-fsxRiO0RMxlvwkCQ-ug_yL0-9pnttPLyBXSW_1lG0-I4niidVESLRLVXm2mThCQdIkwPXuF30HhtSVKqM7TbAkPdQZqDHCsTTG-4D5a071Cll6VGx9FWmo6b2GtxwDR5mcjZx-sW5vc9wJy3T63FWwg
                                                        2024-10-02 17:01:04 UTC706INHTTP/1.1 200 OK
                                                        Accept-Ranges: bytes
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to="static-on-bigtable"
                                                        Report-To: {"group":"static-on-bigtable","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/static-on-bigtable"}]}
                                                        Content-Length: 5430
                                                        X-Content-Type-Options: nosniff
                                                        Server: sffe
                                                        X-XSS-Protection: 0
                                                        Date: Wed, 02 Oct 2024 13:38:50 GMT
                                                        Expires: Thu, 10 Oct 2024 13:38:50 GMT
                                                        Cache-Control: public, max-age=691200
                                                        Last-Modified: Tue, 22 Oct 2019 18:30:00 GMT
                                                        Content-Type: image/x-icon
                                                        Vary: Accept-Encoding
                                                        Age: 12134
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close
                                                        2024-10-02 17:01:04 UTC684INData Raw: 00 00 01 00 02 00 10 10 00 00 01 00 20 00 68 04 00 00 26 00 00 00 20 20 00 00 01 00 20 00 a8 10 00 00 8e 04 00 00 28 00 00 00 10 00 00 00 20 00 00 00 01 00 20 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 30 fd fd fd 96 fd fd fd d8 fd fd fd f9 fd fd fd f9 fd fd fd d7 fd fd fd 94 fe fe fe 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd 99 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 95 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd c1 ff ff ff ff fa fd f9 ff b4 d9 a7 ff 76 ba 5d ff 58 ab 3a ff 58 aa 3a ff 72 b8 59 ff ac d5 9d ff f8 fb f6 ff ff
                                                        Data Ascii: h& ( 0.v]X:X:rY
                                                        2024-10-02 17:01:04 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d8 fd fd fd 99 ff ff ff ff 92 cf fb ff 37 52 ec ff 38 46 ea ff d0 d4 fa ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 96 fe fe fe 32 ff ff ff ff f9 f9 fe ff 56 62 ed ff 35 43 ea ff 3b 49 eb ff 95 9c f4 ff cf d2 fa ff d1 d4 fa ff 96 9d f4 ff 52 5e ed ff e1 e3 fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 30 00 00 00 00 fd fd fd 9d ff ff ff ff e8 ea fd ff 58 63 ee ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 6c 76 f0 ff ff ff ff ff ff ff ff ff fd fd fd 98 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd c3 ff ff ff ff f9 f9 fe ff a5 ac f6 ff 5d 69 ee ff 3c
                                                        Data Ascii: 7R8F2Vb5C;IR^0Xc5C5C5C5C5C5Clv]i<
                                                        2024-10-02 17:01:04 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d0 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd fd fd 8b ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff b1 d8 a3 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 60 a5 35 ff ca 8e 3e ff f9 c1 9f ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 87 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 25 fd fd fd fb ff ff ff ff ff ff ff ff ff ff ff ff c2 e0 b7 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 6e b6 54 ff 9f ce 8d ff b7 da aa ff b8 db ab ff a5 d2 95 ff 7b bc 64 ff 54 a8 35 ff 53 a8 34 ff 77 a0 37 ff e3 89 41 ff f4 85 42 ff f4 85 42
                                                        Data Ascii: S4S4S4S4S4S4S4S4S4S4S4S4S4S4`5>%S4S4S4S4S4S4nT{dT5S4w7ABB
                                                        2024-10-02 17:01:04 UTC1390INData Raw: 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff fb d5 bf ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd ea fd fd fd cb ff ff ff ff ff ff ff ff ff ff ff ff 46 cd fc ff 05 bc fb ff 05 bc fb ff 05 bc fb ff 21 ae f9 ff fb fb ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd c8 fd fd fd 9c ff ff ff ff ff ff ff ff ff ff ff ff 86 df fd ff 05 bc fb ff 05 bc fb ff 15 93 f5 ff 34 49 eb ff b3 b8 f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                        Data Ascii: BBBBBBBF!4I
                                                        2024-10-02 17:01:04 UTC576INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d2 fe fe fe 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd 8d fd fd fd fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd fb fd fd fd 8b fe fe fe 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 27 fd fd fd 9f fd fd fd f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                        Data Ascii: $'


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        10192.168.2.4497694.175.87.197443
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:01:06 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=4WVoa1EKVMpv428&MD=3agPLFr8 HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                        Host: slscr.update.microsoft.com
                                                        2024-10-02 17:01:06 UTC560INHTTP/1.1 200 OK
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Content-Type: application/octet-stream
                                                        Expires: -1
                                                        Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                        ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                                                        MS-CorrelationId: 7170f991-83ca-4c8e-bf39-91c1dd11129b
                                                        MS-RequestId: d549a1ab-110a-4047-b8f4-853b6f5be4b0
                                                        MS-CV: bP4b73DE9UCjOPY7.0
                                                        X-Microsoft-SLSClientCache: 2880
                                                        Content-Disposition: attachment; filename=environment.cab
                                                        X-Content-Type-Options: nosniff
                                                        Date: Wed, 02 Oct 2024 17:01:05 GMT
                                                        Connection: close
                                                        Content-Length: 24490
                                                        2024-10-02 17:01:06 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                                                        Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                                                        2024-10-02 17:01:06 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                                                        Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        11192.168.2.449775142.250.185.1744436360C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:01:09 UTC1298OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1221
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: text/plain;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiTocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=K0eKjaNklXRZ50lSgNrYReWzWA-fsxRiO0RMxlvwkCQ-ug_yL0-9pnttPLyBXSW_1lG0-I4niidVESLRLVXm2mThCQdIkwPXuF30HhtSVKqM7TbAkPdQZqDHCsTTG-4D5a071Cll6VGx9FWmo6b2GtxwDR5mcjZx-sW5vc9wJy3T63FWwg
                                                        2024-10-02 17:01:09 UTC1221OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 34 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 35 35 38 2c 5b 5b 22 31 37 32 37 38 38 38 34 35 37 30 30 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,null,null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[4,0,0,0,0]]],558,[["1727888457000",null,null,null,
                                                        2024-10-02 17:01:09 UTC940INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=Itk0ef3qh2g15oNps52V8xhYoIa5ibeMcSq0NCU2b2D3JogP_FLrvKD9OHDdDnMjsE_zfh8KFpSZlk3cFWzQ8a67EC2ozi-R6XV_fruy4iYsq7z-eNldHzLHHfwCDwAd0NG4cZiNmA4vmUxUAbitC2fdnHiUJp4qLwCqtAIfOCge3jvUKWB7BZInKg; expires=Thu, 03-Apr-2025 17:01:09 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 17:01:09 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Wed, 02 Oct 2024 17:01:09 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 17:01:09 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 17:01:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        12192.168.2.449782142.250.185.1744436360C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:01:32 UTC1329OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1245
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiTocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=Itk0ef3qh2g15oNps52V8xhYoIa5ibeMcSq0NCU2b2D3JogP_FLrvKD9OHDdDnMjsE_zfh8KFpSZlk3cFWzQ8a67EC2ozi-R6XV_fruy4iYsq7z-eNldHzLHHfwCDwAd0NG4cZiNmA4vmUxUAbitC2fdnHiUJp4qLwCqtAIfOCge3jvUKWB7BZInKg
                                                        2024-10-02 17:01:32 UTC1245OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 38 34 39 31 32 39 32 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727888491292",null,null,null
                                                        2024-10-02 17:01:33 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 17:01:32 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 17:01:33 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 17:01:33 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        13192.168.2.449783142.250.185.1744436360C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:01:33 UTC1329OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1285
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiTocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=Itk0ef3qh2g15oNps52V8xhYoIa5ibeMcSq0NCU2b2D3JogP_FLrvKD9OHDdDnMjsE_zfh8KFpSZlk3cFWzQ8a67EC2ozi-R6XV_fruy4iYsq7z-eNldHzLHHfwCDwAd0NG4cZiNmA4vmUxUAbitC2fdnHiUJp4qLwCqtAIfOCge3jvUKWB7BZInKg
                                                        2024-10-02 17:01:33 UTC1285OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 38 34 39 32 33 37 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727888492370",null,null,null
                                                        2024-10-02 17:01:33 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 17:01:33 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 17:01:33 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 17:01:33 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        14192.168.2.449784142.250.185.1744436360C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:01:33 UTC1288OUTPOST /log?hasfast=true&authuser=0&format=json HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 865
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        Content-Type: text/plain;charset=UTF-8
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiTocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: no-cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=Itk0ef3qh2g15oNps52V8xhYoIa5ibeMcSq0NCU2b2D3JogP_FLrvKD9OHDdDnMjsE_zfh8KFpSZlk3cFWzQ8a67EC2ozi-R6XV_fruy4iYsq7z-eNldHzLHHfwCDwAd0NG4cZiNmA4vmUxUAbitC2fdnHiUJp4qLwCqtAIfOCge3jvUKWB7BZInKg
                                                        2024-10-02 17:01:33 UTC865OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 62 6f 71 5f 69 64 65 6e 74 69 74 79 66 72 6f 6e 74 65 6e 64 61 75 74 68 75 69 73 65 72 76 65 72 5f 32 30 32 34 30 39 32 39 2e 30 37 5f 70 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 33 2c 30 2c 30
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"boq_identityfrontendauthuiserver_20240929.07_p0",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[3,0,0
                                                        2024-10-02 17:01:34 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 17:01:34 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 17:01:34 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 17:01:34 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        15192.168.2.4497854.175.87.197443
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:01:44 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=4WVoa1EKVMpv428&MD=3agPLFr8 HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                        Host: slscr.update.microsoft.com
                                                        2024-10-02 17:01:44 UTC560INHTTP/1.1 200 OK
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Content-Type: application/octet-stream
                                                        Expires: -1
                                                        Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                        ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                                                        MS-CorrelationId: 739750a1-faac-40ab-9f62-57a8242d5622
                                                        MS-RequestId: 1fbfad41-34dc-45d1-ae33-df58afd03c33
                                                        MS-CV: G+0o13AstkS7meCk.0
                                                        X-Microsoft-SLSClientCache: 1440
                                                        Content-Disposition: attachment; filename=environment.cab
                                                        X-Content-Type-Options: nosniff
                                                        Date: Wed, 02 Oct 2024 17:01:43 GMT
                                                        Connection: close
                                                        Content-Length: 30005
                                                        2024-10-02 17:01:44 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                                                        Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                                                        2024-10-02 17:01:44 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                                                        Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        16192.168.2.449789216.58.206.784436360C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:02:03 UTC1329OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1335
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiTocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=Itk0ef3qh2g15oNps52V8xhYoIa5ibeMcSq0NCU2b2D3JogP_FLrvKD9OHDdDnMjsE_zfh8KFpSZlk3cFWzQ8a67EC2ozi-R6XV_fruy4iYsq7z-eNldHzLHHfwCDwAd0NG4cZiNmA4vmUxUAbitC2fdnHiUJp4qLwCqtAIfOCge3jvUKWB7BZInKg
                                                        2024-10-02 17:02:03 UTC1335OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 38 35 32 31 39 33 39 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727888521939",null,null,null
                                                        2024-10-02 17:02:03 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 17:02:03 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 17:02:03 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 17:02:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        17192.168.2.449790216.58.206.784436360C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:02:05 UTC1329OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1462
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiTocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=Itk0ef3qh2g15oNps52V8xhYoIa5ibeMcSq0NCU2b2D3JogP_FLrvKD9OHDdDnMjsE_zfh8KFpSZlk3cFWzQ8a67EC2ozi-R6XV_fruy4iYsq7z-eNldHzLHHfwCDwAd0NG4cZiNmA4vmUxUAbitC2fdnHiUJp4qLwCqtAIfOCge3jvUKWB7BZInKg
                                                        2024-10-02 17:02:05 UTC1462OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 38 35 32 33 37 37 33 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727888523773",null,null,null
                                                        2024-10-02 17:02:05 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 17:02:05 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 17:02:05 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 17:02:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        18192.168.2.449792216.58.206.784436360C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:02:33 UTC1329OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1182
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiTocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=Itk0ef3qh2g15oNps52V8xhYoIa5ibeMcSq0NCU2b2D3JogP_FLrvKD9OHDdDnMjsE_zfh8KFpSZlk3cFWzQ8a67EC2ozi-R6XV_fruy4iYsq7z-eNldHzLHHfwCDwAd0NG4cZiNmA4vmUxUAbitC2fdnHiUJp4qLwCqtAIfOCge3jvUKWB7BZInKg
                                                        2024-10-02 17:02:33 UTC1182OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 38 35 35 32 30 39 36 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727888552096",null,null,null
                                                        2024-10-02 17:02:33 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 17:02:33 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 17:02:33 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 17:02:33 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        19192.168.2.449793216.58.206.784436360C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:02:37 UTC1329OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1276
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiTocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=Itk0ef3qh2g15oNps52V8xhYoIa5ibeMcSq0NCU2b2D3JogP_FLrvKD9OHDdDnMjsE_zfh8KFpSZlk3cFWzQ8a67EC2ozi-R6XV_fruy4iYsq7z-eNldHzLHHfwCDwAd0NG4cZiNmA4vmUxUAbitC2fdnHiUJp4qLwCqtAIfOCge3jvUKWB7BZInKg
                                                        2024-10-02 17:02:37 UTC1276OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 38 35 35 35 39 31 34 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727888555914",null,null,null
                                                        2024-10-02 17:02:37 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 17:02:37 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 17:02:37 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 17:02:37 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:13:00:46
                                                        Start date:02/10/2024
                                                        Path:C:\Users\user\Desktop\file.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\file.exe"
                                                        Imagebase:0x150000
                                                        File size:918'528 bytes
                                                        MD5 hash:983A1A23EB06EF4323EE7A01425E47EF
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:1
                                                        Start time:13:00:47
                                                        Start date:02/10/2024
                                                        Path:C:\Windows\SysWOW64\taskkill.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:taskkill /F /IM chrome.exe /T
                                                        Imagebase:0x20000
                                                        File size:74'240 bytes
                                                        MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:2
                                                        Start time:13:00:47
                                                        Start date:02/10/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff7699e0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:3
                                                        Start time:13:00:48
                                                        Start date:02/10/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
                                                        Imagebase:0x7ff76e190000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:5
                                                        Start time:13:00:49
                                                        Start date:02/10/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 --field-trial-handle=2280,i,13778231416929703980,17669459964122129621,262144 /prefetch:8
                                                        Imagebase:0x7ff76e190000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:6
                                                        Start time:13:01:01
                                                        Start date:02/10/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5796 --field-trial-handle=2280,i,13778231416929703980,17669459964122129621,262144 /prefetch:8
                                                        Imagebase:0x7ff76e190000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:7
                                                        Start time:13:01:01
                                                        Start date:02/10/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=2280,i,13778231416929703980,17669459964122129621,262144 /prefetch:8
                                                        Imagebase:0x7ff76e190000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:2.2%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:7.1%
                                                          Total number of Nodes:1656
                                                          Total number of Limit Nodes:63
                                                          execution_graph 95507 152e37 95586 15a961 95507->95586 95511 152e6b 95605 153a5a 95511->95605 95513 152e7f 95612 159cb3 95513->95612 95518 152ead 95640 15a8c7 22 API calls __fread_nolock 95518->95640 95519 192cb0 95658 1c2cf9 95519->95658 95521 192cc3 95522 192ccf 95521->95522 95684 154f39 95521->95684 95527 154f39 68 API calls 95522->95527 95525 152ec3 95641 156f88 22 API calls 95525->95641 95530 192ce5 95527->95530 95528 152ecf 95529 159cb3 22 API calls 95528->95529 95531 152edc 95529->95531 95690 153084 22 API calls 95530->95690 95642 15a81b 41 API calls 95531->95642 95533 152eec 95536 159cb3 22 API calls 95533->95536 95535 192d02 95691 153084 22 API calls 95535->95691 95538 152f12 95536->95538 95643 15a81b 41 API calls 95538->95643 95540 192d1e 95541 153a5a 24 API calls 95540->95541 95542 192d44 95541->95542 95692 153084 22 API calls 95542->95692 95543 152f21 95546 15a961 22 API calls 95543->95546 95545 192d50 95693 15a8c7 22 API calls __fread_nolock 95545->95693 95548 152f3f 95546->95548 95644 153084 22 API calls 95548->95644 95550 192d5e 95694 153084 22 API calls 95550->95694 95551 152f4b 95645 174a28 40 API calls 3 library calls 95551->95645 95554 192d6d 95695 15a8c7 22 API calls __fread_nolock 95554->95695 95555 152f59 95555->95530 95556 152f63 95555->95556 95646 174a28 40 API calls 3 library calls 95556->95646 95559 192d83 95696 153084 22 API calls 95559->95696 95560 152f6e 95560->95535 95562 152f78 95560->95562 95647 174a28 40 API calls 3 library calls 95562->95647 95563 192d90 95565 152f83 95565->95540 95566 152f8d 95565->95566 95648 174a28 40 API calls 3 library calls 95566->95648 95568 152f98 95569 152fdc 95568->95569 95649 153084 22 API calls 95568->95649 95569->95554 95570 152fe8 95569->95570 95570->95563 95652 1563eb 22 API calls 95570->95652 95572 152fbf 95650 15a8c7 22 API calls __fread_nolock 95572->95650 95575 152ff8 95653 156a50 22 API calls 95575->95653 95576 152fcd 95651 153084 22 API calls 95576->95651 95579 153006 95654 1570b0 23 API calls 95579->95654 95583 153021 95584 153065 95583->95584 95655 156f88 22 API calls 95583->95655 95656 1570b0 23 API calls 95583->95656 95657 153084 22 API calls 95583->95657 95697 16fe0b 95586->95697 95588 15a976 95707 16fddb 95588->95707 95590 152e4d 95591 154ae3 95590->95591 95592 154af0 __wsopen_s 95591->95592 95594 154b22 95592->95594 95735 156b57 95592->95735 95598 154b58 95594->95598 95732 154c6d 95594->95732 95596 154c29 95597 154c5e 95596->95597 95599 159cb3 22 API calls 95596->95599 95597->95511 95598->95596 95600 159cb3 22 API calls 95598->95600 95604 154c6d 22 API calls 95598->95604 95747 15515f 95598->95747 95601 154c52 95599->95601 95600->95598 95602 15515f 22 API calls 95601->95602 95602->95597 95604->95598 95764 191f50 95605->95764 95608 159cb3 22 API calls 95609 153a8d 95608->95609 95766 153aa2 95609->95766 95611 153a97 95611->95513 95613 159cc2 _wcslen 95612->95613 95614 16fe0b 22 API calls 95613->95614 95615 159cea __fread_nolock 95614->95615 95616 16fddb 22 API calls 95615->95616 95617 152e8c 95616->95617 95618 154ecb 95617->95618 95786 154e90 LoadLibraryA 95618->95786 95623 154ef6 LoadLibraryExW 95794 154e59 LoadLibraryA 95623->95794 95624 193ccf 95625 154f39 68 API calls 95624->95625 95627 193cd6 95625->95627 95629 154e59 3 API calls 95627->95629 95632 193cde 95629->95632 95631 154f20 95631->95632 95633 154f2c 95631->95633 95816 1550f5 95632->95816 95634 154f39 68 API calls 95633->95634 95636 152ea5 95634->95636 95636->95518 95636->95519 95639 193d05 95640->95525 95641->95528 95642->95533 95643->95543 95644->95551 95645->95555 95646->95560 95647->95565 95648->95568 95649->95572 95650->95576 95651->95569 95652->95575 95653->95579 95654->95583 95655->95583 95656->95583 95657->95583 95659 1c2d15 95658->95659 95660 15511f 64 API calls 95659->95660 95661 1c2d29 95660->95661 95966 1c2e66 95661->95966 95664 1550f5 40 API calls 95665 1c2d56 95664->95665 95666 1550f5 40 API calls 95665->95666 95667 1c2d66 95666->95667 95668 1550f5 40 API calls 95667->95668 95669 1c2d81 95668->95669 95670 1550f5 40 API calls 95669->95670 95671 1c2d9c 95670->95671 95672 15511f 64 API calls 95671->95672 95673 1c2db3 95672->95673 95674 17ea0c ___std_exception_copy 21 API calls 95673->95674 95675 1c2dba 95674->95675 95676 17ea0c ___std_exception_copy 21 API calls 95675->95676 95677 1c2dc4 95676->95677 95678 1550f5 40 API calls 95677->95678 95679 1c2dd8 95678->95679 95680 1c28fe 27 API calls 95679->95680 95682 1c2dee 95680->95682 95681 1c2d3f 95681->95521 95682->95681 95972 1c22ce 79 API calls 95682->95972 95685 154f43 95684->95685 95687 154f4a 95684->95687 95973 17e678 95685->95973 95688 154f59 95687->95688 95689 154f6a FreeLibrary 95687->95689 95688->95522 95689->95688 95690->95535 95691->95540 95692->95545 95693->95550 95694->95554 95695->95559 95696->95563 95699 16fddb 95697->95699 95700 16fdfa 95699->95700 95703 16fdfc 95699->95703 95717 17ea0c 95699->95717 95724 174ead 7 API calls 2 library calls 95699->95724 95700->95588 95702 17066d 95726 1732a4 RaiseException 95702->95726 95703->95702 95725 1732a4 RaiseException 95703->95725 95706 17068a 95706->95588 95709 16fde0 95707->95709 95708 17ea0c ___std_exception_copy 21 API calls 95708->95709 95709->95708 95710 16fdfa 95709->95710 95712 16fdfc 95709->95712 95729 174ead 7 API calls 2 library calls 95709->95729 95710->95590 95716 17066d 95712->95716 95730 1732a4 RaiseException 95712->95730 95715 17068a 95715->95590 95731 1732a4 RaiseException 95716->95731 95722 183820 __dosmaperr 95717->95722 95718 18385e 95728 17f2d9 20 API calls __dosmaperr 95718->95728 95720 183849 RtlAllocateHeap 95721 18385c 95720->95721 95720->95722 95721->95699 95722->95718 95722->95720 95727 174ead 7 API calls 2 library calls 95722->95727 95724->95699 95725->95702 95726->95706 95727->95722 95728->95721 95729->95709 95730->95716 95731->95715 95753 15aec9 95732->95753 95734 154c78 95734->95594 95736 156b67 _wcslen 95735->95736 95737 194ba1 95735->95737 95740 156ba2 95736->95740 95741 156b7d 95736->95741 95760 1593b2 95737->95760 95739 194baa 95739->95739 95742 16fddb 22 API calls 95740->95742 95759 156f34 22 API calls 95741->95759 95744 156bae 95742->95744 95746 16fe0b 22 API calls 95744->95746 95745 156b85 __fread_nolock 95745->95594 95746->95745 95748 15516e 95747->95748 95752 15518f __fread_nolock 95747->95752 95750 16fe0b 22 API calls 95748->95750 95749 16fddb 22 API calls 95751 1551a2 95749->95751 95750->95752 95751->95598 95752->95749 95754 15aedc 95753->95754 95758 15aed9 __fread_nolock 95753->95758 95755 16fddb 22 API calls 95754->95755 95756 15aee7 95755->95756 95757 16fe0b 22 API calls 95756->95757 95757->95758 95758->95734 95759->95745 95761 1593c0 95760->95761 95762 1593c9 __fread_nolock 95760->95762 95761->95762 95763 15aec9 22 API calls 95761->95763 95762->95739 95763->95762 95765 153a67 GetModuleFileNameW 95764->95765 95765->95608 95767 191f50 __wsopen_s 95766->95767 95768 153aaf GetFullPathNameW 95767->95768 95769 153ace 95768->95769 95770 153ae9 95768->95770 95771 156b57 22 API calls 95769->95771 95780 15a6c3 95770->95780 95773 153ada 95771->95773 95776 1537a0 95773->95776 95777 1537ae 95776->95777 95778 1593b2 22 API calls 95777->95778 95779 1537c2 95778->95779 95779->95611 95781 15a6d0 95780->95781 95782 15a6dd 95780->95782 95781->95773 95783 16fddb 22 API calls 95782->95783 95784 15a6e7 95783->95784 95785 16fe0b 22 API calls 95784->95785 95785->95781 95787 154ec6 95786->95787 95788 154ea8 GetProcAddress 95786->95788 95791 17e5eb 95787->95791 95789 154eb8 95788->95789 95789->95787 95790 154ebf FreeLibrary 95789->95790 95790->95787 95824 17e52a 95791->95824 95793 154eea 95793->95623 95793->95624 95795 154e8d 95794->95795 95796 154e6e GetProcAddress 95794->95796 95799 154f80 95795->95799 95797 154e7e 95796->95797 95797->95795 95798 154e86 FreeLibrary 95797->95798 95798->95795 95800 16fe0b 22 API calls 95799->95800 95801 154f95 95800->95801 95892 155722 95801->95892 95803 154fa1 __fread_nolock 95804 1550a5 95803->95804 95805 193d1d 95803->95805 95815 154fdc 95803->95815 95895 1542a2 CreateStreamOnHGlobal 95804->95895 95906 1c304d 74 API calls 95805->95906 95808 193d22 95810 15511f 64 API calls 95808->95810 95809 1550f5 40 API calls 95809->95815 95811 193d45 95810->95811 95812 1550f5 40 API calls 95811->95812 95814 15506e messages 95812->95814 95814->95631 95815->95808 95815->95809 95815->95814 95901 15511f 95815->95901 95817 155107 95816->95817 95820 193d70 95816->95820 95928 17e8c4 95817->95928 95821 1c28fe 95949 1c274e 95821->95949 95823 1c2919 95823->95639 95827 17e536 ___DestructExceptionObject 95824->95827 95825 17e544 95849 17f2d9 20 API calls __dosmaperr 95825->95849 95827->95825 95829 17e574 95827->95829 95828 17e549 95850 1827ec 26 API calls pre_c_initialization 95828->95850 95831 17e586 95829->95831 95832 17e579 95829->95832 95841 188061 95831->95841 95851 17f2d9 20 API calls __dosmaperr 95832->95851 95835 17e554 __wsopen_s 95835->95793 95836 17e58f 95837 17e595 95836->95837 95838 17e5a2 95836->95838 95852 17f2d9 20 API calls __dosmaperr 95837->95852 95853 17e5d4 LeaveCriticalSection __fread_nolock 95838->95853 95842 18806d ___DestructExceptionObject 95841->95842 95854 182f5e EnterCriticalSection 95842->95854 95844 18807b 95855 1880fb 95844->95855 95848 1880ac __wsopen_s 95848->95836 95849->95828 95850->95835 95851->95835 95852->95835 95853->95835 95854->95844 95862 18811e 95855->95862 95856 188088 95868 1880b7 95856->95868 95857 188177 95873 184c7d 95857->95873 95862->95856 95862->95857 95871 17918d EnterCriticalSection 95862->95871 95872 1791a1 LeaveCriticalSection 95862->95872 95863 188189 95863->95856 95886 183405 11 API calls 2 library calls 95863->95886 95865 1881a8 95887 17918d EnterCriticalSection 95865->95887 95891 182fa6 LeaveCriticalSection 95868->95891 95870 1880be 95870->95848 95871->95862 95872->95862 95878 184c8a __dosmaperr 95873->95878 95874 184cca 95889 17f2d9 20 API calls __dosmaperr 95874->95889 95875 184cb5 RtlAllocateHeap 95876 184cc8 95875->95876 95875->95878 95880 1829c8 95876->95880 95878->95874 95878->95875 95888 174ead 7 API calls 2 library calls 95878->95888 95881 1829fc _free 95880->95881 95882 1829d3 RtlFreeHeap 95880->95882 95881->95863 95882->95881 95883 1829e8 95882->95883 95890 17f2d9 20 API calls __dosmaperr 95883->95890 95885 1829ee GetLastError 95885->95881 95886->95865 95887->95856 95888->95878 95889->95876 95890->95885 95891->95870 95893 16fddb 22 API calls 95892->95893 95894 155734 95893->95894 95894->95803 95896 1542bc FindResourceExW 95895->95896 95900 1542d9 95895->95900 95897 1935ba LoadResource 95896->95897 95896->95900 95898 1935cf SizeofResource 95897->95898 95897->95900 95899 1935e3 LockResource 95898->95899 95898->95900 95899->95900 95900->95815 95902 193d90 95901->95902 95903 15512e 95901->95903 95907 17ece3 95903->95907 95906->95808 95910 17eaaa 95907->95910 95909 15513c 95909->95815 95912 17eab6 ___DestructExceptionObject 95910->95912 95911 17eac2 95923 17f2d9 20 API calls __dosmaperr 95911->95923 95912->95911 95913 17eae8 95912->95913 95925 17918d EnterCriticalSection 95913->95925 95916 17eac7 95924 1827ec 26 API calls pre_c_initialization 95916->95924 95917 17eaf4 95926 17ec0a 62 API calls 2 library calls 95917->95926 95920 17eb08 95927 17eb27 LeaveCriticalSection __fread_nolock 95920->95927 95922 17ead2 __wsopen_s 95922->95909 95923->95916 95924->95922 95925->95917 95926->95920 95927->95922 95931 17e8e1 95928->95931 95930 155118 95930->95821 95932 17e8ed ___DestructExceptionObject 95931->95932 95933 17e900 ___scrt_fastfail 95932->95933 95934 17e92d 95932->95934 95935 17e925 __wsopen_s 95932->95935 95944 17f2d9 20 API calls __dosmaperr 95933->95944 95946 17918d EnterCriticalSection 95934->95946 95935->95930 95938 17e937 95947 17e6f8 38 API calls 4 library calls 95938->95947 95939 17e91a 95945 1827ec 26 API calls pre_c_initialization 95939->95945 95942 17e94e 95948 17e96c LeaveCriticalSection __fread_nolock 95942->95948 95944->95939 95945->95935 95946->95938 95947->95942 95948->95935 95952 17e4e8 95949->95952 95951 1c275d 95951->95823 95955 17e469 95952->95955 95954 17e505 95954->95951 95956 17e48c 95955->95956 95957 17e478 95955->95957 95962 17e488 __alldvrm 95956->95962 95965 18333f 11 API calls 2 library calls 95956->95965 95963 17f2d9 20 API calls __dosmaperr 95957->95963 95959 17e47d 95964 1827ec 26 API calls pre_c_initialization 95959->95964 95962->95954 95963->95959 95964->95962 95965->95962 95971 1c2e7a 95966->95971 95967 1550f5 40 API calls 95967->95971 95968 1c2d3b 95968->95664 95968->95681 95969 1c28fe 27 API calls 95969->95971 95970 15511f 64 API calls 95970->95971 95971->95967 95971->95968 95971->95969 95971->95970 95972->95681 95974 17e684 ___DestructExceptionObject 95973->95974 95975 17e695 95974->95975 95976 17e6aa 95974->95976 96003 17f2d9 20 API calls __dosmaperr 95975->96003 95977 17e6a5 __wsopen_s 95976->95977 95986 17918d EnterCriticalSection 95976->95986 95977->95687 95980 17e69a 96004 1827ec 26 API calls pre_c_initialization 95980->96004 95981 17e6c6 95987 17e602 95981->95987 95984 17e6d1 96005 17e6ee LeaveCriticalSection __fread_nolock 95984->96005 95986->95981 95988 17e624 95987->95988 95989 17e60f 95987->95989 95995 17e61f 95988->95995 96006 17dc0b 95988->96006 96038 17f2d9 20 API calls __dosmaperr 95989->96038 95991 17e614 96039 1827ec 26 API calls pre_c_initialization 95991->96039 95995->95984 95999 17e646 96023 18862f 95999->96023 96002 1829c8 _free 20 API calls 96002->95995 96003->95980 96004->95977 96005->95977 96007 17dc23 96006->96007 96008 17dc1f 96006->96008 96007->96008 96009 17d955 __fread_nolock 26 API calls 96007->96009 96012 184d7a 96008->96012 96010 17dc43 96009->96010 96040 1859be 62 API calls 5 library calls 96010->96040 96013 184d90 96012->96013 96014 17e640 96012->96014 96013->96014 96015 1829c8 _free 20 API calls 96013->96015 96016 17d955 96014->96016 96015->96014 96017 17d976 96016->96017 96018 17d961 96016->96018 96017->95999 96041 17f2d9 20 API calls __dosmaperr 96018->96041 96020 17d966 96042 1827ec 26 API calls pre_c_initialization 96020->96042 96022 17d971 96022->95999 96024 18863e 96023->96024 96025 188653 96023->96025 96046 17f2c6 20 API calls __dosmaperr 96024->96046 96026 18868e 96025->96026 96030 18867a 96025->96030 96048 17f2c6 20 API calls __dosmaperr 96026->96048 96029 188643 96047 17f2d9 20 API calls __dosmaperr 96029->96047 96043 188607 96030->96043 96031 188693 96049 17f2d9 20 API calls __dosmaperr 96031->96049 96035 17e64c 96035->95995 96035->96002 96036 18869b 96050 1827ec 26 API calls pre_c_initialization 96036->96050 96038->95991 96039->95995 96040->96008 96041->96020 96042->96022 96051 188585 96043->96051 96045 18862b 96045->96035 96046->96029 96047->96035 96048->96031 96049->96036 96050->96035 96052 188591 ___DestructExceptionObject 96051->96052 96062 185147 EnterCriticalSection 96052->96062 96054 18859f 96055 1885d1 96054->96055 96056 1885c6 96054->96056 96078 17f2d9 20 API calls __dosmaperr 96055->96078 96063 1886ae 96056->96063 96059 1885cc 96079 1885fb LeaveCriticalSection __wsopen_s 96059->96079 96061 1885ee __wsopen_s 96061->96045 96062->96054 96080 1853c4 96063->96080 96065 1886c4 96093 185333 21 API calls 3 library calls 96065->96093 96067 1886be 96067->96065 96068 1886f6 96067->96068 96069 1853c4 __wsopen_s 26 API calls 96067->96069 96068->96065 96070 1853c4 __wsopen_s 26 API calls 96068->96070 96072 1886ed 96069->96072 96073 188702 CloseHandle 96070->96073 96071 18871c 96074 18873e 96071->96074 96094 17f2a3 20 API calls 2 library calls 96071->96094 96075 1853c4 __wsopen_s 26 API calls 96072->96075 96073->96065 96076 18870e GetLastError 96073->96076 96074->96059 96075->96068 96076->96065 96078->96059 96079->96061 96081 1853d1 96080->96081 96082 1853e6 96080->96082 96095 17f2c6 20 API calls __dosmaperr 96081->96095 96086 18540b 96082->96086 96097 17f2c6 20 API calls __dosmaperr 96082->96097 96085 1853d6 96096 17f2d9 20 API calls __dosmaperr 96085->96096 96086->96067 96087 185416 96098 17f2d9 20 API calls __dosmaperr 96087->96098 96089 1853de 96089->96067 96091 18541e 96099 1827ec 26 API calls pre_c_initialization 96091->96099 96093->96071 96094->96074 96095->96085 96096->96089 96097->96087 96098->96091 96099->96089 96100 153156 96103 153170 96100->96103 96104 153187 96103->96104 96105 15318c 96104->96105 96106 1531eb 96104->96106 96143 1531e9 96104->96143 96110 153265 PostQuitMessage 96105->96110 96111 153199 96105->96111 96108 192dfb 96106->96108 96109 1531f1 96106->96109 96107 1531d0 DefWindowProcW 96145 15316a 96107->96145 96162 1518e2 10 API calls 96108->96162 96112 15321d SetTimer RegisterWindowMessageW 96109->96112 96113 1531f8 96109->96113 96110->96145 96115 1531a4 96111->96115 96116 192e7c 96111->96116 96117 153246 CreatePopupMenu 96112->96117 96112->96145 96121 153201 KillTimer 96113->96121 96122 192d9c 96113->96122 96118 192e68 96115->96118 96119 1531ae 96115->96119 96175 1bbf30 34 API calls ___scrt_fastfail 96116->96175 96117->96145 96152 1bc161 96118->96152 96125 192e4d 96119->96125 96126 1531b9 96119->96126 96148 1530f2 96121->96148 96128 192da1 96122->96128 96129 192dd7 MoveWindow 96122->96129 96123 192e1c 96163 16e499 42 API calls 96123->96163 96125->96107 96174 1b0ad7 22 API calls 96125->96174 96132 153253 96126->96132 96137 1531c4 96126->96137 96127 192e8e 96127->96107 96127->96145 96133 192da7 96128->96133 96134 192dc6 SetFocus 96128->96134 96129->96145 96160 15326f 44 API calls ___scrt_fastfail 96132->96160 96133->96137 96138 192db0 96133->96138 96134->96145 96137->96107 96144 1530f2 Shell_NotifyIconW 96137->96144 96161 1518e2 10 API calls 96138->96161 96141 153263 96141->96145 96143->96107 96146 192e41 96144->96146 96164 153837 96146->96164 96149 153154 96148->96149 96150 153104 ___scrt_fastfail 96148->96150 96159 153c50 DeleteObject DestroyWindow 96149->96159 96151 153123 Shell_NotifyIconW 96150->96151 96151->96149 96153 1bc179 ___scrt_fastfail 96152->96153 96154 1bc276 96152->96154 96176 153923 96153->96176 96154->96145 96156 1bc25f KillTimer SetTimer 96156->96154 96157 1bc1a0 96157->96156 96158 1bc251 Shell_NotifyIconW 96157->96158 96158->96156 96159->96145 96160->96141 96161->96145 96162->96123 96163->96137 96165 153862 ___scrt_fastfail 96164->96165 96230 154212 96165->96230 96168 1538e8 96170 153906 Shell_NotifyIconW 96168->96170 96171 193386 Shell_NotifyIconW 96168->96171 96172 153923 24 API calls 96170->96172 96173 15391c 96172->96173 96173->96143 96174->96143 96175->96127 96177 153a13 96176->96177 96178 15393f 96176->96178 96177->96157 96198 156270 96178->96198 96181 193393 LoadStringW 96184 1933ad 96181->96184 96182 15395a 96183 156b57 22 API calls 96182->96183 96185 15396f 96183->96185 96192 153994 ___scrt_fastfail 96184->96192 96204 15a8c7 22 API calls __fread_nolock 96184->96204 96186 1933c9 96185->96186 96187 15397c 96185->96187 96205 156350 22 API calls 96186->96205 96187->96184 96189 153986 96187->96189 96203 156350 22 API calls 96189->96203 96195 1539f9 Shell_NotifyIconW 96192->96195 96193 1933d7 96193->96192 96206 1533c6 96193->96206 96195->96177 96196 1933f9 96197 1533c6 22 API calls 96196->96197 96197->96192 96199 16fe0b 22 API calls 96198->96199 96200 156295 96199->96200 96201 16fddb 22 API calls 96200->96201 96202 15394d 96201->96202 96202->96181 96202->96182 96203->96192 96204->96192 96205->96193 96207 1930bb 96206->96207 96208 1533dd 96206->96208 96210 16fddb 22 API calls 96207->96210 96215 1533ee 96208->96215 96212 1930c5 _wcslen 96210->96212 96211 1533e8 96211->96196 96213 16fe0b 22 API calls 96212->96213 96214 1930fe __fread_nolock 96213->96214 96216 1533fe _wcslen 96215->96216 96217 19311d 96216->96217 96218 153411 96216->96218 96219 16fddb 22 API calls 96217->96219 96225 15a587 96218->96225 96221 193127 96219->96221 96223 16fe0b 22 API calls 96221->96223 96222 15341e __fread_nolock 96222->96211 96224 193157 __fread_nolock 96223->96224 96227 15a59d 96225->96227 96229 15a598 __fread_nolock 96225->96229 96226 19f80f 96227->96226 96228 16fe0b 22 API calls 96227->96228 96228->96229 96229->96222 96231 1538b7 96230->96231 96232 1935a4 96230->96232 96231->96168 96234 1bc874 42 API calls _strftime 96231->96234 96232->96231 96233 1935ad DestroyIcon 96232->96233 96233->96231 96234->96168 96235 151033 96240 154c91 96235->96240 96239 151042 96241 15a961 22 API calls 96240->96241 96242 154cff 96241->96242 96249 153af0 96242->96249 96244 193cb6 96246 154d9c 96246->96244 96247 151038 96246->96247 96252 1551f7 22 API calls __fread_nolock 96246->96252 96248 1700a3 29 API calls __onexit 96247->96248 96248->96239 96253 153b1c 96249->96253 96252->96246 96254 153b0f 96253->96254 96255 153b29 96253->96255 96254->96246 96255->96254 96256 153b30 RegOpenKeyExW 96255->96256 96256->96254 96257 153b4a RegQueryValueExW 96256->96257 96258 153b80 RegCloseKey 96257->96258 96259 153b6b 96257->96259 96258->96254 96259->96258 96260 15dddc 96263 15b710 96260->96263 96264 15b72b 96263->96264 96265 1a00f8 96264->96265 96266 1a0146 96264->96266 96288 15b750 96264->96288 96269 1a0102 96265->96269 96272 1a010f 96265->96272 96265->96288 96329 1d58a2 377 API calls 2 library calls 96266->96329 96327 1d5d33 377 API calls 96269->96327 96290 15ba20 96272->96290 96328 1d61d0 377 API calls 2 library calls 96272->96328 96275 16d336 40 API calls 96275->96288 96276 1a03d9 96276->96276 96280 1a0322 96342 1d5c0c 82 API calls 96280->96342 96284 15ba4e 96288->96275 96288->96280 96288->96284 96289 15bbe0 40 API calls 96288->96289 96288->96290 96294 15ec40 96288->96294 96318 15a81b 41 API calls 96288->96318 96319 16d2f0 40 API calls 96288->96319 96320 16a01b 377 API calls 96288->96320 96321 170242 5 API calls __Init_thread_wait 96288->96321 96322 16edcd 22 API calls 96288->96322 96323 1700a3 29 API calls __onexit 96288->96323 96324 1701f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96288->96324 96325 16ee53 82 API calls 96288->96325 96326 16e5ca 377 API calls 96288->96326 96330 15aceb 96288->96330 96340 1af6bf 23 API calls 96288->96340 96341 15a8c7 22 API calls __fread_nolock 96288->96341 96289->96288 96290->96284 96343 1c359c 82 API calls __wsopen_s 96290->96343 96300 15ec76 messages 96294->96300 96295 16fddb 22 API calls 96295->96300 96296 1a4beb 96351 1c359c 82 API calls __wsopen_s 96296->96351 96297 15ed9d messages 96297->96288 96298 15fef7 96298->96297 96347 15a8c7 22 API calls __fread_nolock 96298->96347 96300->96295 96300->96296 96300->96297 96300->96298 96302 1a4600 96300->96302 96303 1a4b0b 96300->96303 96307 15a8c7 22 API calls 96300->96307 96310 170242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96300->96310 96311 15fbe3 96300->96311 96312 15a961 22 API calls 96300->96312 96314 1700a3 29 API calls pre_c_initialization 96300->96314 96316 1701f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96300->96316 96317 15f3ae messages 96300->96317 96344 1601e0 377 API calls 2 library calls 96300->96344 96345 1606a0 41 API calls messages 96300->96345 96302->96297 96346 15a8c7 22 API calls __fread_nolock 96302->96346 96349 1c359c 82 API calls __wsopen_s 96303->96349 96307->96300 96310->96300 96311->96297 96313 1a4bdc 96311->96313 96311->96317 96312->96300 96350 1c359c 82 API calls __wsopen_s 96313->96350 96314->96300 96316->96300 96317->96297 96348 1c359c 82 API calls __wsopen_s 96317->96348 96318->96288 96319->96288 96320->96288 96321->96288 96322->96288 96323->96288 96324->96288 96325->96288 96326->96288 96327->96272 96328->96290 96329->96288 96331 15acf9 96330->96331 96339 15ad2a messages 96330->96339 96332 15ad55 96331->96332 96333 15ad01 messages 96331->96333 96332->96339 96352 15a8c7 22 API calls __fread_nolock 96332->96352 96335 15ad21 96333->96335 96336 19fa48 96333->96336 96333->96339 96337 19fa3a VariantClear 96335->96337 96335->96339 96336->96339 96353 16ce17 22 API calls messages 96336->96353 96337->96339 96339->96288 96340->96288 96341->96288 96342->96290 96343->96276 96344->96300 96345->96300 96346->96297 96347->96297 96348->96297 96349->96297 96350->96296 96351->96297 96352->96339 96353->96339 96354 15f7bf 96355 15fcb6 96354->96355 96356 15f7d3 96354->96356 96358 15aceb 23 API calls 96355->96358 96357 15fcc2 96356->96357 96359 16fddb 22 API calls 96356->96359 96360 15aceb 23 API calls 96357->96360 96358->96357 96361 15f7e5 96359->96361 96363 15fd3d 96360->96363 96361->96357 96362 15f83e 96361->96362 96361->96363 96379 15ed9d messages 96362->96379 96389 161310 96362->96389 96447 1c1155 22 API calls 96363->96447 96366 16fddb 22 API calls 96387 15ec76 messages 96366->96387 96367 15fef7 96367->96379 96449 15a8c7 22 API calls __fread_nolock 96367->96449 96370 1a4600 96370->96379 96448 15a8c7 22 API calls __fread_nolock 96370->96448 96371 1a4b0b 96451 1c359c 82 API calls __wsopen_s 96371->96451 96372 15a8c7 22 API calls 96372->96387 96378 15fbe3 96378->96379 96381 1a4bdc 96378->96381 96388 15f3ae messages 96378->96388 96380 15a961 22 API calls 96380->96387 96452 1c359c 82 API calls __wsopen_s 96381->96452 96383 1700a3 29 API calls pre_c_initialization 96383->96387 96384 170242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96384->96387 96385 1a4beb 96453 1c359c 82 API calls __wsopen_s 96385->96453 96386 1701f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96386->96387 96387->96366 96387->96367 96387->96370 96387->96371 96387->96372 96387->96378 96387->96379 96387->96380 96387->96383 96387->96384 96387->96385 96387->96386 96387->96388 96445 1601e0 377 API calls 2 library calls 96387->96445 96446 1606a0 41 API calls messages 96387->96446 96388->96379 96450 1c359c 82 API calls __wsopen_s 96388->96450 96390 161376 96389->96390 96391 1617b0 96389->96391 96392 1a6331 96390->96392 96394 161940 9 API calls 96390->96394 96539 170242 5 API calls __Init_thread_wait 96391->96539 96543 1d709c 377 API calls 96392->96543 96397 1613a0 96394->96397 96396 1617ba 96399 1617fb 96396->96399 96401 159cb3 22 API calls 96396->96401 96400 161940 9 API calls 96397->96400 96398 1a633d 96398->96387 96403 1a6346 96399->96403 96405 16182c 96399->96405 96402 1613b6 96400->96402 96408 1617d4 96401->96408 96402->96399 96404 1613ec 96402->96404 96544 1c359c 82 API calls __wsopen_s 96403->96544 96404->96403 96418 161408 __fread_nolock 96404->96418 96407 15aceb 23 API calls 96405->96407 96409 161839 96407->96409 96540 1701f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96408->96540 96541 16d217 377 API calls 96409->96541 96412 1a636e 96545 1c359c 82 API calls __wsopen_s 96412->96545 96414 16153c 96417 161940 9 API calls 96414->96417 96415 1a63d1 96547 1d5745 54 API calls _wcslen 96415->96547 96419 161549 96417->96419 96418->96409 96418->96412 96420 16fddb 22 API calls 96418->96420 96422 16fe0b 22 API calls 96418->96422 96427 15ec40 377 API calls 96418->96427 96428 16152f 96418->96428 96432 1a63b2 96418->96432 96436 1615c7 messages 96418->96436 96424 161940 9 API calls 96419->96424 96419->96436 96420->96418 96421 161872 96421->96392 96542 16faeb 23 API calls 96421->96542 96422->96418 96433 161563 96424->96433 96426 16171d 96426->96387 96427->96418 96428->96414 96428->96415 96429 16167b messages 96429->96426 96538 16ce17 22 API calls messages 96429->96538 96546 1c359c 82 API calls __wsopen_s 96432->96546 96433->96436 96548 15a8c7 22 API calls __fread_nolock 96433->96548 96436->96421 96436->96429 96454 161940 96436->96454 96464 16f645 96436->96464 96471 1e28ab 96436->96471 96476 1e1eda 96436->96476 96504 1e2658 96436->96504 96514 1c5c5a 96436->96514 96519 1dab67 96436->96519 96522 1e13b7 96436->96522 96533 1dabf7 96436->96533 96549 1c359c 82 API calls __wsopen_s 96436->96549 96445->96387 96446->96387 96447->96379 96448->96379 96449->96379 96450->96379 96451->96379 96452->96385 96453->96379 96455 161981 96454->96455 96461 16195d 96454->96461 96550 170242 5 API calls __Init_thread_wait 96455->96550 96457 16198b 96457->96461 96551 1701f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96457->96551 96459 168727 96463 16196e 96459->96463 96553 1701f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96459->96553 96461->96463 96552 170242 5 API calls __Init_thread_wait 96461->96552 96463->96436 96554 15b567 96464->96554 96466 16f659 96467 1af2dc Sleep 96466->96467 96468 16f661 timeGetTime 96466->96468 96469 15b567 39 API calls 96468->96469 96470 16f677 96469->96470 96470->96436 96560 1e2b30 96471->96560 96473 1e28b9 96474 15aceb 23 API calls 96473->96474 96475 1e2901 96474->96475 96475->96436 96477 16fe0b 22 API calls 96476->96477 96478 1e1ef2 96477->96478 96479 155722 22 API calls 96478->96479 96480 1e1efd 96479->96480 96604 159c6e 96480->96604 96483 156b57 22 API calls 96484 1e1f27 96483->96484 96485 157510 53 API calls 96484->96485 96487 1e1f31 96484->96487 96486 1e1f49 96485->96486 96618 1562b5 22 API calls 96486->96618 96499 1e1f8d messages 96487->96499 96620 1563eb 22 API calls 96487->96620 96490 1e1f57 96490->96487 96492 157510 53 API calls 96490->96492 96491 1e1fe2 96621 156a50 22 API calls 96491->96621 96494 1e1f6c 96492->96494 96494->96487 96619 15a8c7 22 API calls __fread_nolock 96494->96619 96495 1e1ff2 96622 1570b0 23 API calls 96495->96622 96498 1e202e GetWindowTextW 96500 16fddb 22 API calls 96498->96500 96499->96436 96503 1e2013 96500->96503 96501 159cb3 22 API calls 96501->96503 96502 1570b0 23 API calls 96502->96503 96503->96498 96503->96499 96503->96501 96503->96502 96505 1e2ad8 54 API calls 96504->96505 96506 1e2669 96505->96506 96507 15b567 39 API calls 96506->96507 96513 1e2678 96506->96513 96508 1e26c1 96507->96508 96509 1e26cc 96508->96509 96510 1e26dd ShowWindow 96508->96510 96633 1b3a6d EnableWindow 96509->96633 96623 1be97b 96510->96623 96513->96436 96515 157510 53 API calls 96514->96515 96516 1c5c6d 96515->96516 96634 1bdbbe lstrlenW 96516->96634 96518 1c5c77 96518->96436 96639 1daff9 96519->96639 96523 1e2ad8 54 API calls 96522->96523 96524 1e13cb 96523->96524 96525 1e1418 GetForegroundWindow 96524->96525 96530 1e13da 96524->96530 96526 1e142a 96525->96526 96527 1e1435 96525->96527 96528 1be97b 5 API calls 96526->96528 96758 16f98e GetForegroundWindow 96527->96758 96528->96527 96530->96436 96531 1e1442 96532 1be97b 5 API calls 96531->96532 96532->96530 96534 1daff9 217 API calls 96533->96534 96536 1dac0c 96534->96536 96535 1dac54 96535->96436 96536->96535 96537 15aceb 23 API calls 96536->96537 96537->96535 96538->96429 96539->96396 96540->96399 96541->96421 96542->96421 96543->96398 96544->96436 96545->96436 96546->96436 96547->96433 96548->96436 96549->96436 96550->96457 96551->96461 96552->96459 96553->96463 96555 15b578 96554->96555 96556 15b57f 96554->96556 96555->96556 96559 1762d1 39 API calls 96555->96559 96556->96466 96558 15b5c2 96558->96466 96559->96558 96566 1e2ad8 96560->96566 96563 1e2b51 timeGetTime 96563->96473 96565 15b567 39 API calls 96565->96563 96567 15aceb 23 API calls 96566->96567 96568 1e2af3 96567->96568 96569 1e2aff 96568->96569 96570 1e2b1d 96568->96570 96576 157510 96569->96576 96572 156b57 22 API calls 96570->96572 96574 1e2b1b 96572->96574 96574->96563 96574->96565 96577 157525 96576->96577 96578 157522 96576->96578 96579 15752d 96577->96579 96580 15755b 96577->96580 96578->96574 96599 15a8c7 22 API calls __fread_nolock 96578->96599 96600 1751c6 26 API calls 96579->96600 96581 1950f6 96580->96581 96583 15756d 96580->96583 96590 19500f 96580->96590 96603 175183 26 API calls 96581->96603 96601 16fb21 51 API calls 96583->96601 96584 15753d 96589 16fddb 22 API calls 96584->96589 96587 19510e 96587->96587 96591 157547 96589->96591 96593 16fe0b 22 API calls 96590->96593 96598 195088 96590->96598 96592 159cb3 22 API calls 96591->96592 96592->96578 96595 195058 96593->96595 96594 16fddb 22 API calls 96596 19507f 96594->96596 96595->96594 96597 159cb3 22 API calls 96596->96597 96597->96598 96602 16fb21 51 API calls 96598->96602 96599->96574 96600->96584 96601->96584 96602->96581 96603->96587 96605 159c7e 96604->96605 96606 19f545 96604->96606 96611 16fddb 22 API calls 96605->96611 96607 19f556 96606->96607 96608 156b57 22 API calls 96606->96608 96609 15a6c3 22 API calls 96607->96609 96608->96607 96610 19f560 96609->96610 96610->96610 96612 159c91 96611->96612 96613 159cac 96612->96613 96614 159c9a 96612->96614 96616 15a961 22 API calls 96613->96616 96615 159cb3 22 API calls 96614->96615 96617 159ca2 96615->96617 96616->96617 96617->96483 96618->96490 96619->96487 96620->96491 96621->96495 96622->96503 96624 1be9f9 96623->96624 96625 1be988 96623->96625 96624->96513 96626 1be98a Sleep 96625->96626 96628 1be993 QueryPerformanceCounter 96625->96628 96626->96624 96628->96626 96629 1be9a1 QueryPerformanceFrequency 96628->96629 96630 1be9ab Sleep QueryPerformanceCounter 96629->96630 96631 1be9ec 96630->96631 96631->96630 96632 1be9f0 96631->96632 96632->96624 96633->96513 96635 1bdbdc GetFileAttributesW 96634->96635 96636 1bdc06 96634->96636 96635->96636 96637 1bdbe8 FindFirstFileW 96635->96637 96636->96518 96637->96636 96638 1bdbf9 FindClose 96637->96638 96638->96636 96640 1db01d ___scrt_fastfail 96639->96640 96641 1db058 96640->96641 96642 1db094 96640->96642 96643 15b567 39 API calls 96641->96643 96644 15b567 39 API calls 96642->96644 96649 1db08b 96642->96649 96645 1db063 96643->96645 96648 1db0a5 96644->96648 96645->96649 96652 15b567 39 API calls 96645->96652 96646 1db0ed 96647 157510 53 API calls 96646->96647 96650 1db10b 96647->96650 96651 15b567 39 API calls 96648->96651 96649->96646 96653 15b567 39 API calls 96649->96653 96730 157620 96650->96730 96651->96649 96655 1db078 96652->96655 96653->96646 96657 15b567 39 API calls 96655->96657 96656 1db115 96658 1db11f 96656->96658 96659 1db1d8 96656->96659 96657->96649 96660 157510 53 API calls 96658->96660 96661 1db20a GetCurrentDirectoryW 96659->96661 96662 157510 53 API calls 96659->96662 96663 1db130 96660->96663 96664 16fe0b 22 API calls 96661->96664 96665 1db1ef 96662->96665 96666 157620 22 API calls 96663->96666 96667 1db22f GetCurrentDirectoryW 96664->96667 96668 157620 22 API calls 96665->96668 96669 1db13a 96666->96669 96670 1db23c 96667->96670 96671 1db1f9 _wcslen 96668->96671 96672 157510 53 API calls 96669->96672 96674 1db275 96670->96674 96676 159c6e 22 API calls 96670->96676 96671->96661 96671->96674 96673 1db14b 96672->96673 96675 157620 22 API calls 96673->96675 96679 1db28b 96674->96679 96680 1db287 96674->96680 96677 1db155 96675->96677 96678 1db255 96676->96678 96681 157510 53 API calls 96677->96681 96682 159c6e 22 API calls 96678->96682 96737 1c07c0 10 API calls 96679->96737 96689 1db2f8 96680->96689 96690 1db39a CreateProcessW 96680->96690 96683 1db166 96681->96683 96684 1db265 96682->96684 96686 157620 22 API calls 96683->96686 96687 159c6e 22 API calls 96684->96687 96692 1db170 96686->96692 96687->96674 96688 1db294 96738 1c06e6 10 API calls 96688->96738 96740 1b11c8 39 API calls 96689->96740 96729 1db32f _wcslen 96690->96729 96695 1db1a6 GetSystemDirectoryW 96692->96695 96699 157510 53 API calls 96692->96699 96694 1db2fd 96697 1db32a 96694->96697 96698 1db323 96694->96698 96701 16fe0b 22 API calls 96695->96701 96696 1db2aa 96739 1c05a7 8 API calls 96696->96739 96742 1b14ce 6 API calls 96697->96742 96741 1b1201 128 API calls 2 library calls 96698->96741 96703 1db187 96699->96703 96706 1db1cb GetSystemDirectoryW 96701->96706 96708 157620 22 API calls 96703->96708 96705 1db2d0 96705->96680 96706->96670 96707 1db328 96707->96729 96711 1db191 _wcslen 96708->96711 96709 1db42f CloseHandle 96712 1db43f 96709->96712 96720 1db49a 96709->96720 96710 1db3d6 GetLastError 96719 1db41a 96710->96719 96711->96670 96711->96695 96714 1db446 CloseHandle 96712->96714 96715 1db451 96712->96715 96714->96715 96717 1db458 CloseHandle 96715->96717 96718 1db463 96715->96718 96716 1db4a6 96716->96719 96717->96718 96721 1db46a CloseHandle 96718->96721 96722 1db475 96718->96722 96734 1c0175 96719->96734 96720->96716 96726 1db4d2 CloseHandle 96720->96726 96721->96722 96743 1c09d9 34 API calls 96722->96743 96725 1db486 96744 1db536 25 API calls 96725->96744 96726->96719 96729->96709 96729->96710 96731 15762a _wcslen 96730->96731 96732 16fe0b 22 API calls 96731->96732 96733 15763f 96732->96733 96733->96656 96745 1c030f 96734->96745 96737->96688 96738->96696 96739->96705 96740->96694 96741->96707 96742->96729 96743->96725 96744->96720 96746 1c0329 96745->96746 96747 1c0321 CloseHandle 96745->96747 96748 1c032e CloseHandle 96746->96748 96749 1c0336 96746->96749 96747->96746 96748->96749 96750 1c033b CloseHandle 96749->96750 96751 1c0343 96749->96751 96750->96751 96752 1c0348 CloseHandle 96751->96752 96753 1c0350 96751->96753 96752->96753 96754 1c035d 96753->96754 96755 1c0355 CloseHandle 96753->96755 96756 1c017d 96754->96756 96757 1c0362 CloseHandle 96754->96757 96755->96754 96756->96436 96757->96756 96759 1af467 96758->96759 96760 16f9a8 96758->96760 96761 1af46e FindWindowW 96759->96761 96762 1af47c IsIconic 96759->96762 96760->96531 96761->96762 96763 1af490 SetForegroundWindow 96762->96763 96764 1af487 ShowWindow 96762->96764 96765 1af56b 96763->96765 96766 1af4a2 7 API calls 96763->96766 96764->96763 96767 1af4eb 9 API calls 96766->96767 96768 1af547 96766->96768 96769 1af543 96767->96769 96770 1af54f AttachThreadInput AttachThreadInput AttachThreadInput 96768->96770 96769->96768 96769->96770 96770->96765 96771 1e2a55 96779 1c1ebc 96771->96779 96774 1e2a70 96781 1b39c0 22 API calls 96774->96781 96776 1e2a7c 96782 1b417d 22 API calls __fread_nolock 96776->96782 96778 1e2a87 96780 1c1ec3 IsWindow 96779->96780 96780->96774 96780->96778 96781->96776 96782->96778 96783 1703fb 96784 170407 ___DestructExceptionObject 96783->96784 96812 16feb1 96784->96812 96786 17040e 96787 170561 96786->96787 96790 170438 96786->96790 96842 17083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96787->96842 96789 170568 96835 174e52 96789->96835 96801 170477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96790->96801 96823 18247d 96790->96823 96797 170457 96799 1704d8 96831 170959 96799->96831 96801->96799 96838 174e1a 38 API calls 2 library calls 96801->96838 96803 1704de 96804 1704f3 96803->96804 96839 170992 GetModuleHandleW 96804->96839 96806 1704fa 96806->96789 96807 1704fe 96806->96807 96808 170507 96807->96808 96840 174df5 28 API calls _abort 96807->96840 96841 170040 13 API calls 2 library calls 96808->96841 96811 17050f 96811->96797 96813 16feba 96812->96813 96844 170698 IsProcessorFeaturePresent 96813->96844 96815 16fec6 96845 172c94 10 API calls 3 library calls 96815->96845 96817 16fecb 96822 16fecf 96817->96822 96846 182317 96817->96846 96820 16fee6 96820->96786 96822->96786 96824 182494 96823->96824 96825 170a8c CatchGuardHandler 5 API calls 96824->96825 96826 170451 96825->96826 96826->96797 96827 182421 96826->96827 96828 182450 96827->96828 96829 170a8c CatchGuardHandler 5 API calls 96828->96829 96830 182479 96829->96830 96830->96801 96905 172340 96831->96905 96833 17096c GetStartupInfoW 96834 17097f 96833->96834 96834->96803 96907 174bcf 96835->96907 96838->96799 96839->96806 96840->96808 96841->96811 96842->96789 96844->96815 96845->96817 96850 18d1f6 96846->96850 96849 172cbd 8 API calls 3 library calls 96849->96822 96853 18d213 96850->96853 96854 18d20f 96850->96854 96852 16fed8 96852->96820 96852->96849 96853->96854 96856 184bfb 96853->96856 96868 170a8c 96854->96868 96857 184c07 ___DestructExceptionObject 96856->96857 96875 182f5e EnterCriticalSection 96857->96875 96859 184c0e 96876 1850af 96859->96876 96861 184c1d 96867 184c2c 96861->96867 96889 184a8f 29 API calls 96861->96889 96864 184c27 96890 184b45 GetStdHandle GetFileType 96864->96890 96866 184c3d __wsopen_s 96866->96853 96891 184c48 LeaveCriticalSection _abort 96867->96891 96869 170a97 IsProcessorFeaturePresent 96868->96869 96870 170a95 96868->96870 96872 170c5d 96869->96872 96870->96852 96904 170c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96872->96904 96874 170d40 96874->96852 96875->96859 96877 1850bb ___DestructExceptionObject 96876->96877 96878 1850c8 96877->96878 96879 1850df 96877->96879 96900 17f2d9 20 API calls __dosmaperr 96878->96900 96892 182f5e EnterCriticalSection 96879->96892 96882 1850cd 96901 1827ec 26 API calls pre_c_initialization 96882->96901 96883 1850eb 96888 185117 96883->96888 96893 185000 96883->96893 96885 1850d7 __wsopen_s 96885->96861 96902 18513e LeaveCriticalSection _abort 96888->96902 96889->96864 96890->96867 96891->96866 96892->96883 96894 184c7d __dosmaperr 20 API calls 96893->96894 96895 185012 96894->96895 96899 18501f 96895->96899 96903 183405 11 API calls 2 library calls 96895->96903 96896 1829c8 _free 20 API calls 96898 185071 96896->96898 96898->96883 96899->96896 96900->96882 96901->96885 96902->96885 96903->96895 96904->96874 96906 172357 96905->96906 96906->96833 96906->96906 96908 174bdb _abort 96907->96908 96909 174bf4 96908->96909 96910 174be2 96908->96910 96931 182f5e EnterCriticalSection 96909->96931 96946 174d29 GetModuleHandleW 96910->96946 96913 174be7 96913->96909 96947 174d6d GetModuleHandleExW 96913->96947 96914 174c99 96935 174cd9 96914->96935 96918 174c70 96923 174c88 96918->96923 96927 182421 _abort 5 API calls 96918->96927 96920 174cb6 96938 174ce8 96920->96938 96921 174ce2 96955 191d29 5 API calls CatchGuardHandler 96921->96955 96922 174bfb 96922->96914 96922->96918 96932 1821a8 96922->96932 96928 182421 _abort 5 API calls 96923->96928 96927->96923 96928->96914 96931->96922 96956 181ee1 96932->96956 96975 182fa6 LeaveCriticalSection 96935->96975 96937 174cb2 96937->96920 96937->96921 96976 18360c 96938->96976 96941 174d16 96944 174d6d _abort 8 API calls 96941->96944 96942 174cf6 GetPEB 96942->96941 96943 174d06 GetCurrentProcess TerminateProcess 96942->96943 96943->96941 96945 174d1e ExitProcess 96944->96945 96946->96913 96948 174d97 GetProcAddress 96947->96948 96949 174dba 96947->96949 96950 174dac 96948->96950 96951 174dc0 FreeLibrary 96949->96951 96952 174dc9 96949->96952 96950->96949 96951->96952 96953 170a8c CatchGuardHandler 5 API calls 96952->96953 96954 174bf3 96953->96954 96954->96909 96959 181e90 96956->96959 96958 181f05 96958->96918 96960 181e9c ___DestructExceptionObject 96959->96960 96967 182f5e EnterCriticalSection 96960->96967 96962 181eaa 96968 181f31 96962->96968 96966 181ec8 __wsopen_s 96966->96958 96967->96962 96969 181f59 96968->96969 96970 181f51 96968->96970 96969->96970 96973 1829c8 _free 20 API calls 96969->96973 96971 170a8c CatchGuardHandler 5 API calls 96970->96971 96972 181eb7 96971->96972 96974 181ed5 LeaveCriticalSection _abort 96972->96974 96973->96970 96974->96966 96975->96937 96977 183631 96976->96977 96978 183627 96976->96978 96983 182fd7 5 API calls 2 library calls 96977->96983 96980 170a8c CatchGuardHandler 5 API calls 96978->96980 96981 174cf2 96980->96981 96981->96941 96981->96942 96982 183648 96982->96978 96983->96982 96984 151098 96989 1542de 96984->96989 96988 1510a7 96990 15a961 22 API calls 96989->96990 96991 1542f5 GetVersionExW 96990->96991 96992 156b57 22 API calls 96991->96992 96993 154342 96992->96993 96994 1593b2 22 API calls 96993->96994 97003 154378 96993->97003 96995 15436c 96994->96995 96997 1537a0 22 API calls 96995->96997 96996 15441b GetCurrentProcess IsWow64Process 96998 154437 96996->96998 96997->97003 96999 15444f LoadLibraryA 96998->96999 97000 193824 GetSystemInfo 96998->97000 97001 154460 GetProcAddress 96999->97001 97002 15449c GetSystemInfo 96999->97002 97001->97002 97005 154470 GetNativeSystemInfo 97001->97005 97006 154476 97002->97006 97003->96996 97004 1937df 97003->97004 97005->97006 97007 15109d 97006->97007 97008 15447a FreeLibrary 97006->97008 97009 1700a3 29 API calls __onexit 97007->97009 97008->97007 97009->96988 97010 15105b 97015 15344d 97010->97015 97012 15106a 97046 1700a3 29 API calls __onexit 97012->97046 97014 151074 97016 15345d __wsopen_s 97015->97016 97017 15a961 22 API calls 97016->97017 97018 153513 97017->97018 97019 153a5a 24 API calls 97018->97019 97020 15351c 97019->97020 97047 153357 97020->97047 97023 1533c6 22 API calls 97024 153535 97023->97024 97025 15515f 22 API calls 97024->97025 97026 153544 97025->97026 97027 15a961 22 API calls 97026->97027 97028 15354d 97027->97028 97029 15a6c3 22 API calls 97028->97029 97030 153556 RegOpenKeyExW 97029->97030 97031 193176 RegQueryValueExW 97030->97031 97035 153578 97030->97035 97032 19320c RegCloseKey 97031->97032 97033 193193 97031->97033 97032->97035 97043 19321e _wcslen 97032->97043 97034 16fe0b 22 API calls 97033->97034 97036 1931ac 97034->97036 97035->97012 97037 155722 22 API calls 97036->97037 97038 1931b7 RegQueryValueExW 97037->97038 97039 1931d4 97038->97039 97041 1931ee messages 97038->97041 97040 156b57 22 API calls 97039->97040 97040->97041 97041->97032 97042 159cb3 22 API calls 97042->97043 97043->97035 97043->97042 97044 15515f 22 API calls 97043->97044 97045 154c6d 22 API calls 97043->97045 97044->97043 97045->97043 97046->97014 97048 191f50 __wsopen_s 97047->97048 97049 153364 GetFullPathNameW 97048->97049 97050 153386 97049->97050 97051 156b57 22 API calls 97050->97051 97052 1533a4 97051->97052 97052->97023 97053 1a3f75 97064 16ceb1 97053->97064 97055 1a3f8b 97056 1a4006 97055->97056 97131 16e300 23 API calls 97055->97131 97073 15bf40 97056->97073 97060 1a3fe6 97063 1a4052 97060->97063 97132 1c1abf 22 API calls 97060->97132 97061 1a4a88 97063->97061 97133 1c359c 82 API calls __wsopen_s 97063->97133 97065 16ced2 97064->97065 97066 16cebf 97064->97066 97068 16ced7 97065->97068 97069 16cf05 97065->97069 97067 15aceb 23 API calls 97066->97067 97072 16cec9 97067->97072 97071 16fddb 22 API calls 97068->97071 97070 15aceb 23 API calls 97069->97070 97070->97072 97071->97072 97072->97055 97134 15adf0 97073->97134 97075 15bf9d 97076 1a04b6 97075->97076 97077 15bfa9 97075->97077 97162 1c359c 82 API calls __wsopen_s 97076->97162 97079 1a04c6 97077->97079 97080 15c01e 97077->97080 97163 1c359c 82 API calls __wsopen_s 97079->97163 97139 15ac91 97080->97139 97083 15c7da 97088 16fe0b 22 API calls 97083->97088 97085 1b7120 22 API calls 97116 15c039 __fread_nolock messages 97085->97116 97096 15c808 __fread_nolock 97088->97096 97090 1a04f5 97094 1a055a 97090->97094 97164 16d217 377 API calls 97090->97164 97093 15af8a 22 API calls 97093->97116 97130 15c603 97094->97130 97165 1c359c 82 API calls __wsopen_s 97094->97165 97095 16fe0b 22 API calls 97115 15c350 __fread_nolock messages 97095->97115 97096->97095 97097 1a091a 97174 1c3209 23 API calls 97097->97174 97100 15ec40 377 API calls 97100->97116 97101 1a08a5 97102 15ec40 377 API calls 97101->97102 97103 1a08cf 97102->97103 97103->97130 97172 15a81b 41 API calls 97103->97172 97105 1a0591 97166 1c359c 82 API calls __wsopen_s 97105->97166 97106 1a08f6 97173 1c359c 82 API calls __wsopen_s 97106->97173 97111 15c3ac 97111->97063 97112 15c237 97117 15c253 97112->97117 97175 15a8c7 22 API calls __fread_nolock 97112->97175 97113 16fddb 22 API calls 97113->97116 97114 15aceb 23 API calls 97114->97116 97115->97111 97161 16ce17 22 API calls messages 97115->97161 97116->97083 97116->97085 97116->97090 97116->97093 97116->97094 97116->97096 97116->97097 97116->97100 97116->97101 97116->97105 97116->97106 97116->97112 97116->97113 97116->97114 97121 1a09bf 97116->97121 97126 15bbe0 40 API calls 97116->97126 97129 16fe0b 22 API calls 97116->97129 97116->97130 97143 15ad81 97116->97143 97167 1b7099 22 API calls __fread_nolock 97116->97167 97168 1d5745 54 API calls _wcslen 97116->97168 97169 16aa42 22 API calls messages 97116->97169 97170 1bf05c 40 API calls 97116->97170 97171 15a993 41 API calls 97116->97171 97119 1a0976 97117->97119 97120 15c297 messages 97117->97120 97123 15aceb 23 API calls 97119->97123 97120->97121 97124 15aceb 23 API calls 97120->97124 97121->97130 97176 1c359c 82 API calls __wsopen_s 97121->97176 97123->97121 97125 15c335 97124->97125 97125->97121 97127 15c342 97125->97127 97126->97116 97150 15a704 97127->97150 97129->97116 97130->97063 97131->97060 97132->97056 97133->97061 97135 15ae01 97134->97135 97138 15ae1c messages 97134->97138 97136 15aec9 22 API calls 97135->97136 97137 15ae09 CharUpperBuffW 97136->97137 97137->97138 97138->97075 97140 15acae 97139->97140 97141 15acd1 97140->97141 97177 1c359c 82 API calls __wsopen_s 97140->97177 97141->97116 97144 19fadb 97143->97144 97145 15ad92 97143->97145 97146 16fddb 22 API calls 97145->97146 97147 15ad99 97146->97147 97178 15adcd 97147->97178 97151 19f86f 97150->97151 97154 15a718 97150->97154 97152 19f87f 97151->97152 97198 1b4d4a 22 API calls messages 97151->97198 97155 15a746 97154->97155 97156 15af8a 22 API calls 97154->97156 97160 15a763 messages 97154->97160 97157 15a74c 97155->97157 97186 15af8a 97155->97186 97156->97155 97157->97160 97194 15b090 97157->97194 97160->97115 97161->97115 97162->97079 97163->97130 97164->97094 97165->97130 97166->97130 97167->97116 97168->97116 97169->97116 97170->97116 97171->97116 97172->97106 97173->97130 97174->97112 97175->97117 97176->97130 97177->97141 97181 15addd 97178->97181 97179 15adb6 97179->97116 97180 16fddb 22 API calls 97180->97181 97181->97179 97181->97180 97182 15a961 22 API calls 97181->97182 97184 15adcd 22 API calls 97181->97184 97185 15a8c7 22 API calls __fread_nolock 97181->97185 97182->97181 97184->97181 97185->97181 97187 15af98 97186->97187 97193 15afc0 messages 97186->97193 97188 15afa6 97187->97188 97189 15af8a 22 API calls 97187->97189 97190 15afac 97188->97190 97191 15af8a 22 API calls 97188->97191 97189->97188 97192 15b090 22 API calls 97190->97192 97190->97193 97191->97190 97192->97193 97193->97157 97196 15b09b messages 97194->97196 97195 15b0d6 messages 97195->97160 97196->97195 97199 16ce17 22 API calls messages 97196->97199 97198->97152 97199->97195 97200 151044 97205 1510f3 97200->97205 97202 15104a 97241 1700a3 29 API calls __onexit 97202->97241 97204 151054 97242 151398 97205->97242 97209 15116a 97210 15a961 22 API calls 97209->97210 97211 151174 97210->97211 97212 15a961 22 API calls 97211->97212 97213 15117e 97212->97213 97214 15a961 22 API calls 97213->97214 97215 151188 97214->97215 97216 15a961 22 API calls 97215->97216 97217 1511c6 97216->97217 97218 15a961 22 API calls 97217->97218 97219 151292 97218->97219 97252 15171c 97219->97252 97223 1512c4 97224 15a961 22 API calls 97223->97224 97225 1512ce 97224->97225 97226 161940 9 API calls 97225->97226 97227 1512f9 97226->97227 97273 151aab 97227->97273 97229 151315 97230 151325 GetStdHandle 97229->97230 97231 192485 97230->97231 97232 15137a 97230->97232 97231->97232 97233 19248e 97231->97233 97235 151387 OleInitialize 97232->97235 97234 16fddb 22 API calls 97233->97234 97236 192495 97234->97236 97235->97202 97280 1c011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97236->97280 97238 19249e 97281 1c0944 CreateThread 97238->97281 97240 1924aa CloseHandle 97240->97232 97241->97204 97282 1513f1 97242->97282 97245 1513f1 22 API calls 97246 1513d0 97245->97246 97247 15a961 22 API calls 97246->97247 97248 1513dc 97247->97248 97249 156b57 22 API calls 97248->97249 97250 151129 97249->97250 97251 151bc3 6 API calls 97250->97251 97251->97209 97253 15a961 22 API calls 97252->97253 97254 15172c 97253->97254 97255 15a961 22 API calls 97254->97255 97256 151734 97255->97256 97257 15a961 22 API calls 97256->97257 97258 15174f 97257->97258 97259 16fddb 22 API calls 97258->97259 97260 15129c 97259->97260 97261 151b4a 97260->97261 97262 151b58 97261->97262 97263 15a961 22 API calls 97262->97263 97264 151b63 97263->97264 97265 15a961 22 API calls 97264->97265 97266 151b6e 97265->97266 97267 15a961 22 API calls 97266->97267 97268 151b79 97267->97268 97269 15a961 22 API calls 97268->97269 97270 151b84 97269->97270 97271 16fddb 22 API calls 97270->97271 97272 151b96 RegisterWindowMessageW 97271->97272 97272->97223 97274 19272d 97273->97274 97275 151abb 97273->97275 97289 1c3209 23 API calls 97274->97289 97276 16fddb 22 API calls 97275->97276 97278 151ac3 97276->97278 97278->97229 97279 192738 97280->97238 97281->97240 97290 1c092a 28 API calls 97281->97290 97283 15a961 22 API calls 97282->97283 97284 1513fc 97283->97284 97285 15a961 22 API calls 97284->97285 97286 151404 97285->97286 97287 15a961 22 API calls 97286->97287 97288 1513c6 97287->97288 97288->97245 97289->97279 97291 152de3 97292 152df0 __wsopen_s 97291->97292 97293 192c2b ___scrt_fastfail 97292->97293 97294 152e09 97292->97294 97297 192c47 GetOpenFileNameW 97293->97297 97295 153aa2 23 API calls 97294->97295 97296 152e12 97295->97296 97307 152da5 97296->97307 97299 192c96 97297->97299 97301 156b57 22 API calls 97299->97301 97302 192cab 97301->97302 97302->97302 97304 152e27 97325 1544a8 97304->97325 97308 191f50 __wsopen_s 97307->97308 97309 152db2 GetLongPathNameW 97308->97309 97310 156b57 22 API calls 97309->97310 97311 152dda 97310->97311 97312 153598 97311->97312 97313 15a961 22 API calls 97312->97313 97314 1535aa 97313->97314 97315 153aa2 23 API calls 97314->97315 97316 1535b5 97315->97316 97317 1535c0 97316->97317 97320 1932eb 97316->97320 97319 15515f 22 API calls 97317->97319 97321 1535cc 97319->97321 97322 19330d 97320->97322 97360 16ce60 41 API calls 97320->97360 97354 1535f3 97321->97354 97324 1535df 97324->97304 97326 154ecb 94 API calls 97325->97326 97327 1544cd 97326->97327 97328 193833 97327->97328 97330 154ecb 94 API calls 97327->97330 97329 1c2cf9 80 API calls 97328->97329 97331 193848 97329->97331 97332 1544e1 97330->97332 97333 193869 97331->97333 97334 19384c 97331->97334 97332->97328 97335 1544e9 97332->97335 97337 16fe0b 22 API calls 97333->97337 97336 154f39 68 API calls 97334->97336 97338 1544f5 97335->97338 97339 193854 97335->97339 97336->97339 97342 1938ae 97337->97342 97361 15940c 136 API calls 2 library calls 97338->97361 97362 1bda5a 82 API calls 97339->97362 97345 193a5f 97342->97345 97351 159cb3 22 API calls 97342->97351 97363 1b967e 22 API calls __fread_nolock 97342->97363 97364 1b95ad 42 API calls _wcslen 97342->97364 97365 1c0b5a 22 API calls 97342->97365 97366 15a4a1 22 API calls __fread_nolock 97342->97366 97367 153ff7 22 API calls 97342->97367 97343 152e31 97344 193862 97344->97333 97346 154f39 68 API calls 97345->97346 97368 1b989b 82 API calls __wsopen_s 97345->97368 97346->97345 97351->97342 97355 153605 97354->97355 97359 153624 __fread_nolock 97354->97359 97357 16fe0b 22 API calls 97355->97357 97356 16fddb 22 API calls 97358 15363b 97356->97358 97357->97359 97358->97324 97359->97356 97360->97320 97361->97343 97362->97344 97363->97342 97364->97342 97365->97342 97366->97342 97367->97342 97368->97345 97369 151cad SystemParametersInfoW 97370 188402 97375 1881be 97370->97375 97373 18842a 97376 1881ef try_get_first_available_module 97375->97376 97383 188338 97376->97383 97390 178e0b 40 API calls 2 library calls 97376->97390 97378 1883ee 97394 1827ec 26 API calls pre_c_initialization 97378->97394 97380 188343 97380->97373 97387 190984 97380->97387 97382 18838c 97382->97383 97391 178e0b 40 API calls 2 library calls 97382->97391 97383->97380 97393 17f2d9 20 API calls __dosmaperr 97383->97393 97385 1883ab 97385->97383 97392 178e0b 40 API calls 2 library calls 97385->97392 97395 190081 97387->97395 97389 19099f 97389->97373 97390->97382 97391->97385 97392->97383 97393->97378 97394->97380 97398 19008d ___DestructExceptionObject 97395->97398 97396 19009b 97452 17f2d9 20 API calls __dosmaperr 97396->97452 97398->97396 97399 1900d4 97398->97399 97406 19065b 97399->97406 97400 1900a0 97453 1827ec 26 API calls pre_c_initialization 97400->97453 97405 1900aa __wsopen_s 97405->97389 97407 190678 97406->97407 97408 19068d 97407->97408 97409 1906a6 97407->97409 97469 17f2c6 20 API calls __dosmaperr 97408->97469 97455 185221 97409->97455 97412 190692 97470 17f2d9 20 API calls __dosmaperr 97412->97470 97413 1906ab 97414 1906cb 97413->97414 97415 1906b4 97413->97415 97468 19039a CreateFileW 97414->97468 97471 17f2c6 20 API calls __dosmaperr 97415->97471 97419 1906b9 97472 17f2d9 20 API calls __dosmaperr 97419->97472 97420 190781 GetFileType 97423 19078c GetLastError 97420->97423 97424 1907d3 97420->97424 97422 190756 GetLastError 97474 17f2a3 20 API calls 2 library calls 97422->97474 97475 17f2a3 20 API calls 2 library calls 97423->97475 97477 18516a 21 API calls 3 library calls 97424->97477 97425 190704 97425->97420 97425->97422 97473 19039a CreateFileW 97425->97473 97429 19079a CloseHandle 97429->97412 97432 1907c3 97429->97432 97431 190749 97431->97420 97431->97422 97476 17f2d9 20 API calls __dosmaperr 97432->97476 97433 1907f4 97438 190840 97433->97438 97478 1905ab 72 API calls 4 library calls 97433->97478 97435 1907c8 97435->97412 97440 19086d 97438->97440 97479 19014d 72 API calls 4 library calls 97438->97479 97439 190866 97439->97440 97441 19087e 97439->97441 97442 1886ae __wsopen_s 29 API calls 97440->97442 97443 1900f8 97441->97443 97444 1908fc CloseHandle 97441->97444 97442->97443 97454 190121 LeaveCriticalSection __wsopen_s 97443->97454 97480 19039a CreateFileW 97444->97480 97446 190927 97447 190931 GetLastError 97446->97447 97448 19095d 97446->97448 97481 17f2a3 20 API calls 2 library calls 97447->97481 97448->97443 97450 19093d 97482 185333 21 API calls 3 library calls 97450->97482 97452->97400 97453->97405 97454->97405 97456 18522d ___DestructExceptionObject 97455->97456 97483 182f5e EnterCriticalSection 97456->97483 97458 185234 97460 185259 97458->97460 97463 1852c7 EnterCriticalSection 97458->97463 97466 18527b 97458->97466 97462 185000 __wsopen_s 21 API calls 97460->97462 97461 1852a4 __wsopen_s 97461->97413 97464 18525e 97462->97464 97465 1852d4 LeaveCriticalSection 97463->97465 97463->97466 97464->97466 97487 185147 EnterCriticalSection 97464->97487 97465->97458 97484 18532a 97466->97484 97468->97425 97469->97412 97470->97443 97471->97419 97472->97412 97473->97431 97474->97412 97475->97429 97476->97435 97477->97433 97478->97438 97479->97439 97480->97446 97481->97450 97482->97448 97483->97458 97488 182fa6 LeaveCriticalSection 97484->97488 97486 185331 97486->97461 97487->97466 97488->97486 97489 1a2a00 97505 15d7b0 messages 97489->97505 97490 15db11 PeekMessageW 97490->97505 97491 15d807 GetInputState 97491->97490 97491->97505 97492 1a1cbe TranslateAcceleratorW 97492->97505 97494 15db8f PeekMessageW 97494->97505 97495 15da04 timeGetTime 97495->97505 97496 15db73 TranslateMessage DispatchMessageW 97496->97494 97497 15dbaf Sleep 97497->97505 97498 1a2b74 Sleep 97511 1a2b85 97498->97511 97501 1a1dda timeGetTime 97535 16e300 23 API calls 97501->97535 97504 1a2c0b GetExitCodeProcess 97507 1a2c21 WaitForSingleObject 97504->97507 97508 1a2c37 CloseHandle 97504->97508 97505->97490 97505->97491 97505->97492 97505->97494 97505->97495 97505->97496 97505->97497 97505->97498 97505->97501 97506 15d9d5 97505->97506 97509 1e29bf GetForegroundWindow 97505->97509 97514 1be97b 5 API calls 97505->97514 97517 15ec40 377 API calls 97505->97517 97518 161310 377 API calls 97505->97518 97519 15bf40 377 API calls 97505->97519 97521 15dd50 97505->97521 97528 16edf6 97505->97528 97533 15dfd0 377 API calls 3 library calls 97505->97533 97534 16e551 timeGetTime 97505->97534 97536 1c3a2a 23 API calls 97505->97536 97537 1c359c 82 API calls __wsopen_s 97505->97537 97538 1d5658 23 API calls 97505->97538 97507->97505 97507->97508 97508->97511 97509->97505 97511->97504 97511->97505 97511->97506 97512 1a2ca9 Sleep 97511->97512 97539 16e551 timeGetTime 97511->97539 97540 1bd4dc 47 API calls 97511->97540 97512->97505 97514->97505 97517->97505 97518->97505 97519->97505 97522 15dd83 97521->97522 97523 15dd6f 97521->97523 97573 1c359c 82 API calls __wsopen_s 97522->97573 97541 15d260 97523->97541 97525 15dd7a 97525->97505 97527 1a2f75 97527->97527 97529 16ee09 97528->97529 97531 16ee12 97528->97531 97529->97505 97530 16ee36 IsDialogMessageW 97530->97529 97530->97531 97531->97529 97531->97530 97532 1aefaf GetClassLongW 97531->97532 97532->97530 97532->97531 97533->97505 97534->97505 97535->97505 97536->97505 97537->97505 97538->97505 97539->97511 97540->97511 97542 15ec40 377 API calls 97541->97542 97558 15d29d 97542->97558 97543 1a1bc4 97580 1c359c 82 API calls __wsopen_s 97543->97580 97545 15d30b messages 97545->97525 97546 15d6d5 97546->97545 97556 16fe0b 22 API calls 97546->97556 97547 15d3c3 97547->97546 97549 15d3ce 97547->97549 97548 15d5ff 97550 15d614 97548->97550 97551 1a1bb5 97548->97551 97553 16fddb 22 API calls 97549->97553 97554 16fddb 22 API calls 97550->97554 97579 1d5705 23 API calls 97551->97579 97552 15d4b8 97557 16fe0b 22 API calls 97552->97557 97561 15d3d5 __fread_nolock 97553->97561 97565 15d46a 97554->97565 97556->97561 97568 15d429 __fread_nolock messages 97557->97568 97558->97543 97558->97545 97558->97546 97558->97547 97558->97552 97562 16fddb 22 API calls 97558->97562 97558->97568 97559 16fddb 22 API calls 97560 15d3f6 97559->97560 97560->97568 97574 15bec0 377 API calls 97560->97574 97561->97559 97561->97560 97562->97558 97564 1a1ba4 97578 1c359c 82 API calls __wsopen_s 97564->97578 97565->97525 97568->97548 97568->97564 97568->97565 97569 1a1b7f 97568->97569 97571 1a1b5d 97568->97571 97575 151f6f 377 API calls 97568->97575 97577 1c359c 82 API calls __wsopen_s 97569->97577 97576 1c359c 82 API calls __wsopen_s 97571->97576 97573->97527 97574->97568 97575->97568 97576->97565 97577->97565 97578->97565 97579->97543 97580->97545 97581 192402 97584 151410 97581->97584 97585 1924b8 DestroyWindow 97584->97585 97586 15144f mciSendStringW 97584->97586 97599 1924c4 97585->97599 97587 1516c6 97586->97587 97588 15146b 97586->97588 97587->97588 97590 1516d5 UnregisterHotKey 97587->97590 97589 151479 97588->97589 97588->97599 97617 15182e 97589->97617 97590->97587 97592 192509 97598 19251c FreeLibrary 97592->97598 97600 19252d 97592->97600 97593 1924d8 97593->97599 97623 156246 CloseHandle 97593->97623 97594 1924e2 FindClose 97594->97599 97597 15148e 97597->97600 97604 15149c 97597->97604 97598->97592 97599->97592 97599->97593 97599->97594 97601 192541 VirtualFree 97600->97601 97606 151509 97600->97606 97601->97600 97602 1514f8 CoUninitialize 97602->97606 97603 192589 97610 192598 messages 97603->97610 97624 1c32eb 6 API calls messages 97603->97624 97604->97602 97606->97603 97607 151514 97606->97607 97621 151944 VirtualFreeEx CloseHandle 97607->97621 97609 15153a 97612 151561 97609->97612 97613 192627 97610->97613 97625 1b64d4 22 API calls messages 97610->97625 97612->97610 97614 15161f 97612->97614 97613->97613 97614->97613 97622 151876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 97614->97622 97616 1516c1 97618 15183b 97617->97618 97619 151480 97618->97619 97626 1b702a 22 API calls 97618->97626 97619->97592 97619->97597 97621->97609 97622->97616 97623->97593 97624->97603 97625->97610 97626->97618 97627 192ba5 97628 152b25 97627->97628 97629 192baf 97627->97629 97655 152b83 7 API calls 97628->97655 97631 153a5a 24 API calls 97629->97631 97633 192bb8 97631->97633 97635 159cb3 22 API calls 97633->97635 97637 192bc6 97635->97637 97636 152b2f 97642 153837 49 API calls 97636->97642 97648 152b44 97636->97648 97638 192bce 97637->97638 97639 192bf5 97637->97639 97641 1533c6 22 API calls 97638->97641 97640 1533c6 22 API calls 97639->97640 97643 192bf1 GetForegroundWindow ShellExecuteW 97640->97643 97644 192bd9 97641->97644 97642->97648 97650 192c26 97643->97650 97659 156350 22 API calls 97644->97659 97647 152b5f 97652 152b66 SetCurrentDirectoryW 97647->97652 97648->97647 97649 1530f2 Shell_NotifyIconW 97648->97649 97649->97647 97650->97647 97651 192be7 97653 1533c6 22 API calls 97651->97653 97654 152b7a 97652->97654 97653->97643 97660 152cd4 7 API calls 97655->97660 97657 152b2a 97658 152c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 97657->97658 97658->97636 97659->97651 97660->97657

                                                          Control-flow Graph

                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0016F998
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 001AF474
                                                          • IsIconic.USER32(00000000), ref: 001AF47D
                                                          • ShowWindow.USER32(00000000,00000009), ref: 001AF48A
                                                          • SetForegroundWindow.USER32(00000000), ref: 001AF494
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 001AF4AA
                                                          • GetCurrentThreadId.KERNEL32 ref: 001AF4B1
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 001AF4BD
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 001AF4CE
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 001AF4D6
                                                          • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 001AF4DE
                                                          • SetForegroundWindow.USER32(00000000), ref: 001AF4E1
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 001AF4F6
                                                          • keybd_event.USER32(00000012,00000000), ref: 001AF501
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 001AF50B
                                                          • keybd_event.USER32(00000012,00000000), ref: 001AF510
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 001AF519
                                                          • keybd_event.USER32(00000012,00000000), ref: 001AF51E
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 001AF528
                                                          • keybd_event.USER32(00000012,00000000), ref: 001AF52D
                                                          • SetForegroundWindow.USER32(00000000), ref: 001AF530
                                                          • AttachThreadInput.USER32(?,000000FF,00000000), ref: 001AF557
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 4125248594-2988720461
                                                          • Opcode ID: 1a57ac36e70ee863361d0286729292ccb6460a3fcfcb008be90bd732da5a462b
                                                          • Instruction ID: 69f32ccf145a88b4cdcabd124d56a2d5d4e21a39452486ed25d48656a4cbcedd
                                                          • Opcode Fuzzy Hash: 1a57ac36e70ee863361d0286729292ccb6460a3fcfcb008be90bd732da5a462b
                                                          • Instruction Fuzzy Hash: 79314175B40258BFEB206BE55C89FBF7E6DEB45B50F100029FA00EA1D1C7B05942AAA0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 405 1542de-15434d call 15a961 GetVersionExW call 156b57 410 154353 405->410 411 193617-19362a 405->411 412 154355-154357 410->412 413 19362b-19362f 411->413 416 15435d-1543bc call 1593b2 call 1537a0 412->416 417 193656 412->417 414 193631 413->414 415 193632-19363e 413->415 414->415 415->413 418 193640-193642 415->418 434 1937df-1937e6 416->434 435 1543c2-1543c4 416->435 421 19365d-193660 417->421 418->412 420 193648-19364f 418->420 420->411 423 193651 420->423 424 15441b-154435 GetCurrentProcess IsWow64Process 421->424 425 193666-1936a8 421->425 423->417 427 154494-15449a 424->427 428 154437 424->428 425->424 429 1936ae-1936b1 425->429 431 15443d-154449 427->431 428->431 432 1936db-1936e5 429->432 433 1936b3-1936bd 429->433 436 15444f-15445e LoadLibraryA 431->436 437 193824-193828 GetSystemInfo 431->437 441 1936f8-193702 432->441 442 1936e7-1936f3 432->442 438 1936ca-1936d6 433->438 439 1936bf-1936c5 433->439 443 1937e8 434->443 444 193806-193809 434->444 435->421 440 1543ca-1543dd 435->440 450 154460-15446e GetProcAddress 436->450 451 15449c-1544a6 GetSystemInfo 436->451 438->424 439->424 452 1543e3-1543e5 440->452 453 193726-19372f 440->453 446 193715-193721 441->446 447 193704-193710 441->447 442->424 445 1937ee 443->445 448 19380b-19381a 444->448 449 1937f4-1937fc 444->449 445->449 446->424 447->424 448->445 458 19381c-193822 448->458 449->444 450->451 459 154470-154474 GetNativeSystemInfo 450->459 460 154476-154478 451->460 454 19374d-193762 452->454 455 1543eb-1543ee 452->455 456 19373c-193748 453->456 457 193731-193737 453->457 463 19376f-19377b 454->463 464 193764-19376a 454->464 461 1543f4-15440f 455->461 462 193791-193794 455->462 456->424 457->424 458->449 459->460 465 154481-154493 460->465 466 15447a-15447b FreeLibrary 460->466 467 154415 461->467 468 193780-19378c 461->468 462->424 469 19379a-1937c1 462->469 463->424 464->424 466->465 467->424 468->424 470 1937ce-1937da 469->470 471 1937c3-1937c9 469->471 470->424 471->424
                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 0015430D
                                                            • Part of subcall function 00156B57: _wcslen.LIBCMT ref: 00156B6A
                                                          • GetCurrentProcess.KERNEL32(?,001ECB64,00000000,?,?), ref: 00154422
                                                          • IsWow64Process.KERNEL32(00000000,?,?), ref: 00154429
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00154454
                                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00154466
                                                          • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00154474
                                                          • FreeLibrary.KERNEL32(00000000,?,?), ref: 0015447B
                                                          • GetSystemInfo.KERNEL32(?,?,?), ref: 001544A0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                          • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                          • API String ID: 3290436268-3101561225
                                                          • Opcode ID: 240c760eb0e82da9d2a588675ec6738c74e7775eb517bcdbb185bff271dcdb08
                                                          • Instruction ID: 22279f1435e5948761dc6f94fb5d01f71915e6be01572e06a91aeca22725e525
                                                          • Opcode Fuzzy Hash: 240c760eb0e82da9d2a588675ec6738c74e7775eb517bcdbb185bff271dcdb08
                                                          • Instruction Fuzzy Hash: DCA1B66290A2C0EFCB35CBE97C4C9997FA67B36304B0874D9E45197A61D33046ABCB61

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1016 1542a2-1542ba CreateStreamOnHGlobal 1017 1542bc-1542d3 FindResourceExW 1016->1017 1018 1542da-1542dd 1016->1018 1019 1935ba-1935c9 LoadResource 1017->1019 1020 1542d9 1017->1020 1019->1020 1021 1935cf-1935dd SizeofResource 1019->1021 1020->1018 1021->1020 1022 1935e3-1935ee LockResource 1021->1022 1022->1020 1023 1935f4-193612 1022->1023 1023->1020
                                                          APIs
                                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,001550AA,?,?,00000000,00000000), ref: 001542B2
                                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,001550AA,?,?,00000000,00000000), ref: 001542C9
                                                          • LoadResource.KERNEL32(?,00000000,?,?,001550AA,?,?,00000000,00000000,?,?,?,?,?,?,00154F20), ref: 001935BE
                                                          • SizeofResource.KERNEL32(?,00000000,?,?,001550AA,?,?,00000000,00000000,?,?,?,?,?,?,00154F20), ref: 001935D3
                                                          • LockResource.KERNEL32(001550AA,?,?,001550AA,?,?,00000000,00000000,?,?,?,?,?,?,00154F20,?), ref: 001935E6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                          • String ID: SCRIPT
                                                          • API String ID: 3051347437-3967369404
                                                          • Opcode ID: ac72ea9211f716bc877a8379519253496d4644c31e57652ac41b0543c50c65cb
                                                          • Instruction ID: 2d84d6eb4e90176d410e896e0c7df889038c66e723828ae807ea6bd24b13b1cf
                                                          • Opcode Fuzzy Hash: ac72ea9211f716bc877a8379519253496d4644c31e57652ac41b0543c50c65cb
                                                          • Instruction Fuzzy Hash: 2711C270200701FFD7218BA5EC88F2B7BB9EBC5B56F104169F913CA550DB71DC458660

                                                          Control-flow Graph

                                                          APIs
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00152B6B
                                                            • Part of subcall function 00153A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00221418,?,00152E7F,?,?,?,00000000), ref: 00153A78
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                          • GetForegroundWindow.USER32(runas,?,?,?,?,?,00212224), ref: 00192C10
                                                          • ShellExecuteW.SHELL32(00000000,?,?,00212224), ref: 00192C17
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                          • String ID: runas
                                                          • API String ID: 448630720-4000483414
                                                          • Opcode ID: 58abb66e652f029451d8be3b290df8b1e8e54d27d2da737d9dcad6638761366b
                                                          • Instruction ID: ebea74c824aaa9a418887711b52f2fa7500cc38d7cba04a52d75cc58b4ae3fb6
                                                          • Opcode Fuzzy Hash: 58abb66e652f029451d8be3b290df8b1e8e54d27d2da737d9dcad6638761366b
                                                          • Instruction Fuzzy Hash: AC119332204345EAC718FFA0E851DAD77A4ABB6342F44142DF8765F0A2DF31955EC752
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,00195222), ref: 001BDBCE
                                                          • GetFileAttributesW.KERNELBASE(?), ref: 001BDBDD
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 001BDBEE
                                                          • FindClose.KERNEL32(00000000), ref: 001BDBFA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFind$AttributesCloseFirstlstrlen
                                                          • String ID:
                                                          • API String ID: 2695905019-0
                                                          • Opcode ID: 8ca1aac5982ec2a1784c3ff525446598cc6e5b3461bb71809edcd7d85cfb7ce7
                                                          • Instruction ID: c9b63c0114dc520e3fbedca63bea8d9aed94008bfbd053fa7e804c1cc7e91434
                                                          • Opcode Fuzzy Hash: 8ca1aac5982ec2a1784c3ff525446598cc6e5b3461bb71809edcd7d85cfb7ce7
                                                          • Instruction Fuzzy Hash: BAF0A0308109109782246BB8AC4E8AE3B6D9F06334B10470AF936C24E0FBB05D9686D5
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(001828E9,?,00174CBE,001828E9,002188B8,0000000C,00174E15,001828E9,00000002,00000000,?,001828E9), ref: 00174D09
                                                          • TerminateProcess.KERNEL32(00000000,?,00174CBE,001828E9,002188B8,0000000C,00174E15,001828E9,00000002,00000000,?,001828E9), ref: 00174D10
                                                          • ExitProcess.KERNEL32 ref: 00174D22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CurrentExitTerminate
                                                          • String ID:
                                                          • API String ID: 1703294689-0
                                                          • Opcode ID: dfa6e6311f33323395abbf339abff63f72ffdd7b3eda6dc1f8acb25304a6499f
                                                          • Instruction ID: 1c807072b102770047d93a06dc622fd4619fab239725dec4ea4504903891d686
                                                          • Opcode Fuzzy Hash: dfa6e6311f33323395abbf339abff63f72ffdd7b3eda6dc1f8acb25304a6499f
                                                          • Instruction Fuzzy Hash: 93E0B631000188AFCF21AFD4DD59A583B79FB61781B158014FC599A522DB35EE92CB80
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: p#"
                                                          • API String ID: 3964851224-3229190087
                                                          • Opcode ID: bebad4bafeacc2f56bfb03c623d06e4edfca6a3de2017df10a03b7e0ad61e928
                                                          • Instruction ID: 18b92ae40d694f8b4b1cb67cbbd9c609072b49c9e47cf5b2eff5ebb1d2d24c39
                                                          • Opcode Fuzzy Hash: bebad4bafeacc2f56bfb03c623d06e4edfca6a3de2017df10a03b7e0ad61e928
                                                          • Instruction Fuzzy Hash: 2EA26A74A08301DFC715DF18C480B6ABBE1BF99304F15896DE8AA9B352D771EC49CB92

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 16 1daff9-1db056 call 172340 19 1db058-1db06b call 15b567 16->19 20 1db094-1db098 16->20 30 1db06d-1db092 call 15b567 * 2 19->30 31 1db0c8 19->31 21 1db0dd-1db0e0 20->21 22 1db09a-1db0bb call 15b567 * 2 20->22 26 1db0f5-1db119 call 157510 call 157620 21->26 27 1db0e2-1db0e5 21->27 45 1db0bf-1db0c4 22->45 47 1db11f-1db178 call 157510 call 157620 call 157510 call 157620 call 157510 call 157620 26->47 48 1db1d8-1db1e0 26->48 32 1db0e8-1db0ed call 15b567 27->32 30->45 35 1db0cb-1db0cf 31->35 32->26 41 1db0d9-1db0db 35->41 42 1db0d1-1db0d7 35->42 41->21 41->26 42->32 45->21 49 1db0c6 45->49 96 1db17a-1db195 call 157510 call 157620 47->96 97 1db1a6-1db1d6 GetSystemDirectoryW call 16fe0b GetSystemDirectoryW 47->97 52 1db20a-1db238 GetCurrentDirectoryW call 16fe0b GetCurrentDirectoryW 48->52 53 1db1e2-1db1fd call 157510 call 157620 48->53 49->35 62 1db23c 52->62 53->52 66 1db1ff-1db208 call 174963 53->66 65 1db240-1db244 62->65 68 1db275-1db285 call 1c00d9 65->68 69 1db246-1db270 call 159c6e * 3 65->69 66->52 66->68 78 1db28b-1db2e1 call 1c07c0 call 1c06e6 call 1c05a7 68->78 79 1db287-1db289 68->79 69->68 84 1db2ee-1db2f2 78->84 115 1db2e3 78->115 79->84 89 1db2f8-1db321 call 1b11c8 84->89 90 1db39a-1db3be CreateProcessW 84->90 100 1db32a call 1b14ce 89->100 101 1db323-1db328 call 1b1201 89->101 94 1db3c1-1db3d4 call 16fe14 * 2 90->94 117 1db42f-1db43d CloseHandle 94->117 118 1db3d6-1db3e8 94->118 96->97 123 1db197-1db1a0 call 174963 96->123 97->62 114 1db32f-1db33c call 174963 100->114 101->114 131 1db33e-1db345 114->131 132 1db347-1db357 call 174963 114->132 115->84 125 1db49c 117->125 126 1db43f-1db444 117->126 121 1db3ed-1db3fc 118->121 122 1db3ea 118->122 127 1db3fe 121->127 128 1db401-1db42a GetLastError call 15630c call 15cfa0 121->128 122->121 123->65 123->97 129 1db4a0-1db4a4 125->129 133 1db446-1db44c CloseHandle 126->133 134 1db451-1db456 126->134 127->128 143 1db4e5-1db4f6 call 1c0175 128->143 136 1db4a6-1db4b0 129->136 137 1db4b2-1db4bc 129->137 131->131 131->132 153 1db359-1db360 132->153 154 1db362-1db372 call 174963 132->154 133->134 140 1db458-1db45e CloseHandle 134->140 141 1db463-1db468 134->141 136->143 144 1db4be 137->144 145 1db4c4-1db4e3 call 15cfa0 CloseHandle 137->145 140->141 147 1db46a-1db470 CloseHandle 141->147 148 1db475-1db49a call 1c09d9 call 1db536 141->148 144->145 145->143 147->148 148->129 153->153 153->154 162 1db37d-1db398 call 16fe14 * 3 154->162 163 1db374-1db37b 154->163 162->94 163->162 163->163
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 001DB198
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 001DB1B0
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 001DB1D4
                                                          • _wcslen.LIBCMT ref: 001DB200
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 001DB214
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 001DB236
                                                          • _wcslen.LIBCMT ref: 001DB332
                                                            • Part of subcall function 001C05A7: GetStdHandle.KERNEL32(000000F6), ref: 001C05C6
                                                          • _wcslen.LIBCMT ref: 001DB34B
                                                          • _wcslen.LIBCMT ref: 001DB366
                                                          • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 001DB3B6
                                                          • GetLastError.KERNEL32(00000000), ref: 001DB407
                                                          • CloseHandle.KERNEL32(?), ref: 001DB439
                                                          • CloseHandle.KERNEL32(00000000), ref: 001DB44A
                                                          • CloseHandle.KERNEL32(00000000), ref: 001DB45C
                                                          • CloseHandle.KERNEL32(00000000), ref: 001DB46E
                                                          • CloseHandle.KERNEL32(?), ref: 001DB4E3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 2178637699-0
                                                          • Opcode ID: 3017bf7c211ed9630610a7373bf6bc972ca070e788065e81f699e31d6338e0be
                                                          • Instruction ID: 7f5e906cb782ac9c7ac8d13197de103f6d8500bbf66caaa21838b6687145cb3e
                                                          • Opcode Fuzzy Hash: 3017bf7c211ed9630610a7373bf6bc972ca070e788065e81f699e31d6338e0be
                                                          • Instruction Fuzzy Hash: 8CF16731608340DFC714EF24D891A6EBBE1AF95314F15855EF89A8B3A2DB31EC45CB92
                                                          APIs
                                                          • GetInputState.USER32 ref: 0015D807
                                                          • timeGetTime.WINMM ref: 0015DA07
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0015DB28
                                                          • TranslateMessage.USER32(?), ref: 0015DB7B
                                                          • DispatchMessageW.USER32(?), ref: 0015DB89
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0015DB9F
                                                          • Sleep.KERNELBASE(0000000A), ref: 0015DBB1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                          • String ID:
                                                          • API String ID: 2189390790-0
                                                          • Opcode ID: 97d665ee2d89d46247adca0fb2a8fea9557ffc7dae491fd19864908920691ffd
                                                          • Instruction ID: 9eef2bd8b21c24a71ea063b0ad71f7351fae7f4cc0c81e5461f4bfac29f06e6a
                                                          • Opcode Fuzzy Hash: 97d665ee2d89d46247adca0fb2a8fea9557ffc7dae491fd19864908920691ffd
                                                          • Instruction Fuzzy Hash: C0422434608341EFD739CF24D884BAAB7E1BF56315F14851DF8668B2A1D770E888CB92

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00152D07
                                                          • RegisterClassExW.USER32(00000030), ref: 00152D31
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00152D42
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 00152D5F
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00152D6F
                                                          • LoadIconW.USER32(000000A9), ref: 00152D85
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00152D94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: 393e87357262f625bcd433c5f229192c53d5805d20eff818350458c81381a417
                                                          • Instruction ID: f220f92beb78e75089e2b27634b59152673c77134e32fc2e4ae806c0524f9357
                                                          • Opcode Fuzzy Hash: 393e87357262f625bcd433c5f229192c53d5805d20eff818350458c81381a417
                                                          • Instruction Fuzzy Hash: E521B2B5D01258AFDB10DFE8ED89A9DBBB4FB08704F00511AF911AA2A0D7B14596CF91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 473 19065b-19068b call 19042f 476 19068d-190698 call 17f2c6 473->476 477 1906a6-1906b2 call 185221 473->477 482 19069a-1906a1 call 17f2d9 476->482 483 1906cb-190714 call 19039a 477->483 484 1906b4-1906c9 call 17f2c6 call 17f2d9 477->484 493 19097d-190983 482->493 491 190781-19078a GetFileType 483->491 492 190716-19071f 483->492 484->482 497 19078c-1907bd GetLastError call 17f2a3 CloseHandle 491->497 498 1907d3-1907d6 491->498 495 190721-190725 492->495 496 190756-19077c GetLastError call 17f2a3 492->496 495->496 502 190727-190754 call 19039a 495->502 496->482 497->482 512 1907c3-1907ce call 17f2d9 497->512 500 1907d8-1907dd 498->500 501 1907df-1907e5 498->501 505 1907e9-190837 call 18516a 500->505 501->505 506 1907e7 501->506 502->491 502->496 515 190839-190845 call 1905ab 505->515 516 190847-19086b call 19014d 505->516 506->505 512->482 515->516 522 19086f-190879 call 1886ae 515->522 523 19086d 516->523 524 19087e-1908c1 516->524 522->493 523->522 525 1908c3-1908c7 524->525 526 1908e2-1908f0 524->526 525->526 529 1908c9-1908dd 525->529 530 19097b 526->530 531 1908f6-1908fa 526->531 529->526 530->493 531->530 532 1908fc-19092f CloseHandle call 19039a 531->532 535 190931-19095d GetLastError call 17f2a3 call 185333 532->535 536 190963-190977 532->536 535->536 536->530
                                                          APIs
                                                            • Part of subcall function 0019039A: CreateFileW.KERNELBASE(00000000,00000000,?,00190704,?,?,00000000,?,00190704,00000000,0000000C), ref: 001903B7
                                                          • GetLastError.KERNEL32 ref: 0019076F
                                                          • __dosmaperr.LIBCMT ref: 00190776
                                                          • GetFileType.KERNELBASE(00000000), ref: 00190782
                                                          • GetLastError.KERNEL32 ref: 0019078C
                                                          • __dosmaperr.LIBCMT ref: 00190795
                                                          • CloseHandle.KERNEL32(00000000), ref: 001907B5
                                                          • CloseHandle.KERNEL32(?), ref: 001908FF
                                                          • GetLastError.KERNEL32 ref: 00190931
                                                          • __dosmaperr.LIBCMT ref: 00190938
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                          • String ID: H
                                                          • API String ID: 4237864984-2852464175
                                                          • Opcode ID: dd29e7648831ef77aae96efeb2537e84f0c64d52af1e53b066db5272329f35da
                                                          • Instruction ID: 896c7a75568dfb04cb60b2deaf355aae5e2707f52066c283392bd72e4042ca27
                                                          • Opcode Fuzzy Hash: dd29e7648831ef77aae96efeb2537e84f0c64d52af1e53b066db5272329f35da
                                                          • Instruction Fuzzy Hash: 60A12632A041449FDF1AEFA8DC95BAE7BA1AB0A320F14415DF8159F392DB319D13CB91

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00153A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00221418,?,00152E7F,?,?,?,00000000), ref: 00153A78
                                                            • Part of subcall function 00153357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00153379
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0015356A
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0019318D
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 001931CE
                                                          • RegCloseKey.ADVAPI32(?), ref: 00193210
                                                          • _wcslen.LIBCMT ref: 00193277
                                                          • _wcslen.LIBCMT ref: 00193286
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                          • API String ID: 98802146-2727554177
                                                          • Opcode ID: 13d87e701b947bbf71acab6e8132497211baf7e303c6c9a875d096a8739255e7
                                                          • Instruction ID: 387e2a8fa13d084288f1438e1125601ca0a7066f27d1997106f025b3993c0680
                                                          • Opcode Fuzzy Hash: 13d87e701b947bbf71acab6e8132497211baf7e303c6c9a875d096a8739255e7
                                                          • Instruction Fuzzy Hash: 58717D71404301FEC724EFA5EC8586BBBE8FFA4340B80146EF955971A1EB359A4ECB52

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00152B8E
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00152B9D
                                                          • LoadIconW.USER32(00000063), ref: 00152BB3
                                                          • LoadIconW.USER32(000000A4), ref: 00152BC5
                                                          • LoadIconW.USER32(000000A2), ref: 00152BD7
                                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00152BEF
                                                          • RegisterClassExW.USER32(?), ref: 00152C40
                                                            • Part of subcall function 00152CD4: GetSysColorBrush.USER32(0000000F), ref: 00152D07
                                                            • Part of subcall function 00152CD4: RegisterClassExW.USER32(00000030), ref: 00152D31
                                                            • Part of subcall function 00152CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00152D42
                                                            • Part of subcall function 00152CD4: InitCommonControlsEx.COMCTL32(?), ref: 00152D5F
                                                            • Part of subcall function 00152CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00152D6F
                                                            • Part of subcall function 00152CD4: LoadIconW.USER32(000000A9), ref: 00152D85
                                                            • Part of subcall function 00152CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00152D94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                          • String ID: #$0$AutoIt v3
                                                          • API String ID: 423443420-4155596026
                                                          • Opcode ID: c619eebd999e65a80e4f93fded6aea761491e80e4d3b47599afd59e7125f83f3
                                                          • Instruction ID: 1304dc6d78f2f16c4ba3c4b46fe6eae8ac0fdc18bf6d3dc6ab4368f21da69224
                                                          • Opcode Fuzzy Hash: c619eebd999e65a80e4f93fded6aea761491e80e4d3b47599afd59e7125f83f3
                                                          • Instruction Fuzzy Hash: 0021FA71E00354BBDB20DFE5FC99E9D7FB6FB58B50F0410AAE500A66A0D7B105528F90
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 0015BB4E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID: p#"$p#"$p#"$p#"$p%"$p%"$x#"$x#"
                                                          • API String ID: 1385522511-472378502
                                                          • Opcode ID: 15778a0b257ee92b2b05a7bb567d38ed372a2caaff1021fb0e865a11935c64d9
                                                          • Instruction ID: ea858f5c6a0ce23db74ff6d3d8262d06f45044c58e647233fbd964ba8a41ae3d
                                                          • Opcode Fuzzy Hash: 15778a0b257ee92b2b05a7bb567d38ed372a2caaff1021fb0e865a11935c64d9
                                                          • Instruction Fuzzy Hash: CC32EB78A08209EFCB24CF54C884ABAB7B9FF49301F158059ED25AF291C775ED49CB91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 821 153170-153185 822 1531e5-1531e7 821->822 823 153187-15318a 821->823 822->823 824 1531e9 822->824 825 15318c-153193 823->825 826 1531eb 823->826 827 1531d0-1531d8 DefWindowProcW 824->827 830 153265-15326d PostQuitMessage 825->830 831 153199-15319e 825->831 828 192dfb-192e23 call 1518e2 call 16e499 826->828 829 1531f1-1531f6 826->829 832 1531de-1531e4 827->832 864 192e28-192e2f 828->864 834 15321d-153244 SetTimer RegisterWindowMessageW 829->834 835 1531f8-1531fb 829->835 833 153219-15321b 830->833 837 1531a4-1531a8 831->837 838 192e7c-192e90 call 1bbf30 831->838 833->832 834->833 839 153246-153251 CreatePopupMenu 834->839 843 153201-15320f KillTimer call 1530f2 835->843 844 192d9c-192d9f 835->844 840 192e68-192e72 call 1bc161 837->840 841 1531ae-1531b3 837->841 838->833 857 192e96 838->857 839->833 862 192e77 840->862 847 192e4d-192e54 841->847 848 1531b9-1531be 841->848 861 153214 call 153c50 843->861 850 192da1-192da5 844->850 851 192dd7-192df6 MoveWindow 844->851 847->827 860 192e5a-192e63 call 1b0ad7 847->860 855 1531c4-1531ca 848->855 856 153253-153263 call 15326f 848->856 858 192da7-192daa 850->858 859 192dc6-192dd2 SetFocus 850->859 851->833 855->827 855->864 856->833 857->827 858->855 865 192db0-192dc1 call 1518e2 858->865 859->833 860->827 861->833 862->833 864->827 869 192e35-192e48 call 1530f2 call 153837 864->869 865->833 869->827
                                                          APIs
                                                          • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0015316A,?,?), ref: 001531D8
                                                          • KillTimer.USER32(?,00000001,?,?,?,?,?,0015316A,?,?), ref: 00153204
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00153227
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0015316A,?,?), ref: 00153232
                                                          • CreatePopupMenu.USER32 ref: 00153246
                                                          • PostQuitMessage.USER32(00000000), ref: 00153267
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                          • String ID: TaskbarCreated
                                                          • API String ID: 129472671-2362178303
                                                          • Opcode ID: d58a2f3e1fceae2401e52c66054e8fd08b7eae91e3c0f67f98f52ad4c1e12e4e
                                                          • Instruction ID: 389454fc490a789ce3d0748bcb41b302b47e659529619440398dac85b043004b
                                                          • Opcode Fuzzy Hash: d58a2f3e1fceae2401e52c66054e8fd08b7eae91e3c0f67f98f52ad4c1e12e4e
                                                          • Instruction Fuzzy Hash: 36416B34600644FBDF286BF8AC8DF7D3A5AE715382F040125FD318F1A1CB718A9997A1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 877 151410-151449 878 1924b8-1924b9 DestroyWindow 877->878 879 15144f-151465 mciSendStringW 877->879 882 1924c4-1924d1 878->882 880 1516c6-1516d3 879->880 881 15146b-151473 879->881 884 1516d5-1516f0 UnregisterHotKey 880->884 885 1516f8-1516ff 880->885 881->882 883 151479-151488 call 15182e 881->883 886 192500-192507 882->886 887 1924d3-1924d6 882->887 898 19250e-19251a 883->898 899 15148e-151496 883->899 884->885 889 1516f2-1516f3 call 1510d0 884->889 885->881 890 151705 885->890 886->882 891 192509 886->891 892 1924d8-1924e0 call 156246 887->892 893 1924e2-1924e5 FindClose 887->893 889->885 890->880 891->898 897 1924eb-1924f8 892->897 893->897 897->886 903 1924fa-1924fb call 1c32b1 897->903 900 19251c-19251e FreeLibrary 898->900 901 192524-19252b 898->901 904 15149c-1514c1 call 15cfa0 899->904 905 192532-19253f 899->905 900->901 901->898 906 19252d 901->906 903->886 914 1514c3 904->914 915 1514f8-151503 CoUninitialize 904->915 907 192541-19255e VirtualFree 905->907 908 192566-19256d 905->908 906->905 907->908 911 192560-192561 call 1c3317 907->911 908->905 912 19256f 908->912 911->908 919 192574-192578 912->919 917 1514c6-1514f6 call 151a05 call 1519ae 914->917 918 151509-15150e 915->918 915->919 917->915 921 192589-192596 call 1c32eb 918->921 922 151514-15151e 918->922 919->918 923 19257e-192584 919->923 935 192598 921->935 926 151524-15152f call 15988f 922->926 927 151707-151714 call 16f80e 922->927 923->918 938 151535 call 151944 926->938 927->926 937 15171a 927->937 939 19259d-1925bf call 16fdcd 935->939 937->927 940 15153a-15155c call 1517d5 call 16fe14 call 15177c 938->940 946 1925c1 939->946 950 151561-1515a5 call 15988f call 15cfa0 call 1517fe call 16fe14 940->950 949 1925c6-1925e8 call 16fdcd 946->949 955 1925ea 949->955 950->939 967 1515ab-1515cf call 16fe14 950->967 957 1925ef-192611 call 16fdcd 955->957 963 192613 957->963 966 192618-192625 call 1b64d4 963->966 972 192627 966->972 967->949 973 1515d5-1515f9 call 16fe14 967->973 976 19262c-192639 call 16ac64 972->976 973->957 977 1515ff-151619 call 16fe14 973->977 982 19263b 976->982 977->966 983 15161f-151643 call 1517d5 call 16fe14 977->983 984 192640-19264d call 1c3245 982->984 983->976 992 151649-151651 983->992 990 19264f 984->990 993 192654-192661 call 1c32cc 990->993 992->984 994 151657-151675 call 15988f call 15190a 992->994 999 192663 993->999 994->993 1002 15167b-151689 994->1002 1003 192668-192675 call 1c32cc 999->1003 1002->1003 1004 15168f-1516c5 call 15988f * 3 call 151876 1002->1004 1009 192677 1003->1009 1009->1009
                                                          APIs
                                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00151459
                                                          • CoUninitialize.COMBASE ref: 001514F8
                                                          • UnregisterHotKey.USER32(?), ref: 001516DD
                                                          • DestroyWindow.USER32(?), ref: 001924B9
                                                          • FreeLibrary.KERNEL32(?), ref: 0019251E
                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0019254B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                          • String ID: close all
                                                          • API String ID: 469580280-3243417748
                                                          • Opcode ID: ea043cb78ef0be16bb36fea8cf1bb7349a27371b7b1da6edc238e1e8c64f8194
                                                          • Instruction ID: 82f84ae62a18c6b537ae1d07f9b465c31bb818a333fab6c1dc3d7db47daa79d0
                                                          • Opcode Fuzzy Hash: ea043cb78ef0be16bb36fea8cf1bb7349a27371b7b1da6edc238e1e8c64f8194
                                                          • Instruction Fuzzy Hash: B5D1BD31701212EFDB2AEF14D899B69F7A0BF15301F1541ADE85A6B252DB30EC16CF90

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1026 152c63-152cd3 CreateWindowExW * 2 ShowWindow * 2
                                                          APIs
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00152C91
                                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00152CB2
                                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00151CAD,?), ref: 00152CC6
                                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00151CAD,?), ref: 00152CCF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateShow
                                                          • String ID: AutoIt v3$edit
                                                          • API String ID: 1584632944-3779509399
                                                          • Opcode ID: 609bedc9f948df990950406489f3f230b16dc9bb547066eab377f04b45e4842f
                                                          • Instruction ID: b3610b9807e9c10911eb4002153c4be3c31df604297b6eb06743b222432c2d5d
                                                          • Opcode Fuzzy Hash: 609bedc9f948df990950406489f3f230b16dc9bb547066eab377f04b45e4842f
                                                          • Instruction Fuzzy Hash: 6BF03A759403D47AEB304797BC4CE7B3EBED7DAF50B0110AAF900A65A0C2710862DAB0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1415 1be97b-1be986 1416 1be9f9-1be9fb 1415->1416 1417 1be988 1415->1417 1418 1be98a-1be98c 1417->1418 1419 1be98e-1be991 1417->1419 1420 1be9f3 Sleep 1418->1420 1421 1be993-1be99f QueryPerformanceCounter 1419->1421 1422 1be9f2 1419->1422 1420->1416 1421->1422 1423 1be9a1-1be9a5 QueryPerformanceFrequency 1421->1423 1422->1420 1424 1be9ab-1be9ee Sleep QueryPerformanceCounter call 1920b0 1423->1424 1427 1be9f0 1424->1427 1427->1416
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 001BE997
                                                          • QueryPerformanceFrequency.KERNEL32(?), ref: 001BE9A5
                                                          • Sleep.KERNEL32(00000000), ref: 001BE9AD
                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 001BE9B7
                                                          • Sleep.KERNELBASE ref: 001BE9F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                                          • String ID:
                                                          • API String ID: 2833360925-0
                                                          • Opcode ID: 6a1925cb3ca0607944f05eadc184df51a5ffd1a0c906d7128ed5216db8e2cc24
                                                          • Instruction ID: fa44b8d00f33f95147c47a4bbdbc8ef91c4de7321d3296911f926bbd54e334ef
                                                          • Opcode Fuzzy Hash: 6a1925cb3ca0607944f05eadc184df51a5ffd1a0c906d7128ed5216db8e2cc24
                                                          • Instruction Fuzzy Hash: 99012531C01629DBCF00AFE5DC99AEDBBB8FF09705F010556E902B6241CB30A699CBA1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1464 153b1c-153b27 1465 153b99-153b9b 1464->1465 1466 153b29-153b2e 1464->1466 1467 153b8c-153b8f 1465->1467 1466->1465 1468 153b30-153b48 RegOpenKeyExW 1466->1468 1468->1465 1469 153b4a-153b69 RegQueryValueExW 1468->1469 1470 153b80-153b8b RegCloseKey 1469->1470 1471 153b6b-153b76 1469->1471 1470->1467 1472 153b90-153b97 1471->1472 1473 153b78-153b7a 1471->1473 1474 153b7e 1472->1474 1473->1474 1474->1470
                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00153B0F,SwapMouseButtons,00000004,?), ref: 00153B40
                                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00153B0F,SwapMouseButtons,00000004,?), ref: 00153B61
                                                          • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00153B0F,SwapMouseButtons,00000004,?), ref: 00153B83
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID: Control Panel\Mouse
                                                          • API String ID: 3677997916-824357125
                                                          • Opcode ID: f48dbbc770470e6fda1ec9a14b0e8887d808ae09f95cbef7ccf183ce99fb5b9c
                                                          • Instruction ID: f0334f4aea488dab96224e12e8b01e6d658bb8a024b8cbc38965afd9d38cb95c
                                                          • Opcode Fuzzy Hash: f48dbbc770470e6fda1ec9a14b0e8887d808ae09f95cbef7ccf183ce99fb5b9c
                                                          • Instruction Fuzzy Hash: F1112AB5510218FFDB21CFA5DC84AAEB7B8EF44785B104459F825DB110D3319F4597A0
                                                          APIs
                                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 001933A2
                                                            • Part of subcall function 00156B57: _wcslen.LIBCMT ref: 00156B6A
                                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00153A04
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: IconLoadNotifyShell_String_wcslen
                                                          • String ID: Line:
                                                          • API String ID: 2289894680-1585850449
                                                          • Opcode ID: 796872d8faad18f842dfc9db2350fa4cd7c57b16d0731a0f27b18f7209947c80
                                                          • Instruction ID: 45db604e97f9be54285074f500d90cd7ba81e5562891da5f36c691529aec36c2
                                                          • Opcode Fuzzy Hash: 796872d8faad18f842dfc9db2350fa4cd7c57b16d0731a0f27b18f7209947c80
                                                          • Instruction Fuzzy Hash: B031D071408304EAC725EB60EC45FEBB7E8AB64355F00496AF9B98B091DB70965DC7C2
                                                          APIs
                                                          • GetOpenFileNameW.COMDLG32(?), ref: 00192C8C
                                                            • Part of subcall function 00153AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00153A97,?,?,00152E7F,?,?,?,00000000), ref: 00153AC2
                                                            • Part of subcall function 00152DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00152DC4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Name$Path$FileFullLongOpen
                                                          • String ID: X$`e!
                                                          • API String ID: 779396738-4247064546
                                                          • Opcode ID: b61e56b9f93613f5df470afa4b12179bcfd770656f9c41f8629f370578f00c78
                                                          • Instruction ID: 23da9e6a72118012514a764e8b9dee6ff7fd8b9a096deeb11fa974ccc1de7399
                                                          • Opcode Fuzzy Hash: b61e56b9f93613f5df470afa4b12179bcfd770656f9c41f8629f370578f00c78
                                                          • Instruction Fuzzy Hash: 4F21C671A10258AFDF01DF94C849BEE7BF8AF59305F004059E815AB241DBB4558DCBA1
                                                          APIs
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00170668
                                                            • Part of subcall function 001732A4: RaiseException.KERNEL32(?,?,?,0017068A,?,00221444,?,?,?,?,?,?,0017068A,00151129,00218738,00151129), ref: 00173304
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00170685
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$ExceptionRaise
                                                          • String ID: Unknown exception
                                                          • API String ID: 3476068407-410509341
                                                          • Opcode ID: 74b1f0236fa26702e3205815963ea2cdb4fac2bb2d48f05228676e405ea36782
                                                          • Instruction ID: db31edd7bda9dbad8db7d786f4887efe2cb9241e137d192a7372764bbf91e7e1
                                                          • Opcode Fuzzy Hash: 74b1f0236fa26702e3205815963ea2cdb4fac2bb2d48f05228676e405ea36782
                                                          • Instruction Fuzzy Hash: 95F0C23490030DB7CB05BAA4EC96C9E7BBC5E64350B60C135B82C965D2EF71EB76C980
                                                          APIs
                                                            • Part of subcall function 00151BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00151BF4
                                                            • Part of subcall function 00151BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00151BFC
                                                            • Part of subcall function 00151BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00151C07
                                                            • Part of subcall function 00151BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00151C12
                                                            • Part of subcall function 00151BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00151C1A
                                                            • Part of subcall function 00151BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00151C22
                                                            • Part of subcall function 00151B4A: RegisterWindowMessageW.USER32(00000004,?,001512C4), ref: 00151BA2
                                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0015136A
                                                          • OleInitialize.OLE32 ref: 00151388
                                                          • CloseHandle.KERNEL32(00000000,00000000), ref: 001924AB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                          • String ID:
                                                          • API String ID: 1986988660-0
                                                          • Opcode ID: f6e48753ab9ad0e9a226bbaf785cbd2e583a9f3741b804c79c95fdc552d722d9
                                                          • Instruction ID: b7e3722a0c2ae6b87b1220d582af9d9f125d0cca09defd9e3b1e8167a2f9fc4c
                                                          • Opcode Fuzzy Hash: f6e48753ab9ad0e9a226bbaf785cbd2e583a9f3741b804c79c95fdc552d722d9
                                                          • Instruction Fuzzy Hash: 4171D1B4811244BED7A4EFF9BD89E553AE0BBB834439462BAD41ACB261E7344437CF41
                                                          APIs
                                                            • Part of subcall function 00153923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00153A04
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 001BC259
                                                          • KillTimer.USER32(?,00000001,?,?), ref: 001BC261
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 001BC270
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_Timer$Kill
                                                          • String ID:
                                                          • API String ID: 3500052701-0
                                                          • Opcode ID: a82246037934b604775699073ae2849e52c8b39b84a9ace372196ee44c009a42
                                                          • Instruction ID: 230647a0e1a6dedd0183bc54085b31e116e958e85f8156986c221c994491767f
                                                          • Opcode Fuzzy Hash: a82246037934b604775699073ae2849e52c8b39b84a9ace372196ee44c009a42
                                                          • Instruction Fuzzy Hash: 99319570904384AFEB32DF648895BEBBBED9B16304F0004DAD5DAA7241C7745A85CB91
                                                          APIs
                                                          • CloseHandle.KERNELBASE(00000000,00000000,?,?,001885CC,?,00218CC8,0000000C), ref: 00188704
                                                          • GetLastError.KERNEL32(?,001885CC,?,00218CC8,0000000C), ref: 0018870E
                                                          • __dosmaperr.LIBCMT ref: 00188739
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseErrorHandleLast__dosmaperr
                                                          • String ID:
                                                          • API String ID: 2583163307-0
                                                          • Opcode ID: fe54fc5881fbe1bb2b9ba0caba8ad4ec6a26aa326cad3875413a445b5667cc96
                                                          • Instruction ID: e18fbbcb7a22c04552bfd8c4311a74cff24dfe44b4008bbd8a2a9dba4590c955
                                                          • Opcode Fuzzy Hash: fe54fc5881fbe1bb2b9ba0caba8ad4ec6a26aa326cad3875413a445b5667cc96
                                                          • Instruction Fuzzy Hash: AA018932A0466026C3347374A889B7E275A9B92774F79011DFC188B1D3EFA0DE828F90
                                                          APIs
                                                          • TranslateMessage.USER32(?), ref: 0015DB7B
                                                          • DispatchMessageW.USER32(?), ref: 0015DB89
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0015DB9F
                                                          • Sleep.KERNELBASE(0000000A), ref: 0015DBB1
                                                          • TranslateAcceleratorW.USER32(?,?,?), ref: 001A1CC9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                          • String ID:
                                                          • API String ID: 3288985973-0
                                                          • Opcode ID: b4c9737810332ffb2b6898ff120c0b7b435930c6a10d862223827feefc31282c
                                                          • Instruction ID: 3b3628171a57941c0aad52fa53eb6add6d126ae4343e1e72b2528c76eeb6a29c
                                                          • Opcode Fuzzy Hash: b4c9737810332ffb2b6898ff120c0b7b435930c6a10d862223827feefc31282c
                                                          • Instruction Fuzzy Hash: A1F0FE31644380EBE734CBF09C89FAA73A9EF55711F104629EA5ACB4D0DB3094998B56
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 001617F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID: CALL
                                                          • API String ID: 1385522511-4196123274
                                                          • Opcode ID: 354d888e0f19b7a0703a919f613ea948c2f30de8a091307803cef30d45310f32
                                                          • Instruction ID: e62a7f3171b7e9c9f78c7abf41bc3218ac573b2289cfa89c4ddb93691e861322
                                                          • Opcode Fuzzy Hash: 354d888e0f19b7a0703a919f613ea948c2f30de8a091307803cef30d45310f32
                                                          • Instruction Fuzzy Hash: 93229C74608341EFC714DF14C884A2ABBF1BF9A314F19895DF49A8B361D771E865CB82
                                                          APIs
                                                            • Part of subcall function 00156B57: _wcslen.LIBCMT ref: 00156B6A
                                                          • GetWindowTextW.USER32(?,?,00007FFF), ref: 001E2043
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$TextWindow
                                                          • String ID: all
                                                          • API String ID: 4161112387-991457757
                                                          • Opcode ID: e6c401d5214aaa9e80f20d3eb1e3d845ff4d76b50b34399f9e599d773a731d07
                                                          • Instruction ID: 6f0737346af9787a1575e5989369260dee3e1281bdedea6640b59ffa042ac41b
                                                          • Opcode Fuzzy Hash: e6c401d5214aaa9e80f20d3eb1e3d845ff4d76b50b34399f9e599d773a731d07
                                                          • Instruction Fuzzy Hash: 3A51BD71204341AFC304EF24C882EAEB7E5BF98300F40451DF86A9B292DB71ED58CB91
                                                          APIs
                                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00153908
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_
                                                          • String ID:
                                                          • API String ID: 1144537725-0
                                                          • Opcode ID: bf5512c0029c98896f892e4a8930ac1ae1fbeda0acfdf5a615a9c0a76a8bbe44
                                                          • Instruction ID: a4d6993749833659bc8b2e26ca2dc6817443b920e4babc63e1648584db71ec1c
                                                          • Opcode Fuzzy Hash: bf5512c0029c98896f892e4a8930ac1ae1fbeda0acfdf5a615a9c0a76a8bbe44
                                                          • Instruction Fuzzy Hash: 4C31C370504300DFD721DF64D884B97BBE4FB59349F00096EF9B98B240E771AA58CB52
                                                          APIs
                                                          • timeGetTime.WINMM ref: 0016F661
                                                            • Part of subcall function 0015D730: GetInputState.USER32 ref: 0015D807
                                                          • Sleep.KERNEL32(00000000), ref: 001AF2DE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: InputSleepStateTimetime
                                                          • String ID:
                                                          • API String ID: 4149333218-0
                                                          • Opcode ID: 82fe8e39ccf81bdab1933997127f3b2fdc7726fdb7ef2b3b316420723d4de38f
                                                          • Instruction ID: f0d6b388c59ccf14ad73c33e23fc5fc28244b819ad817031bbe7dad9bc10c4c3
                                                          • Opcode Fuzzy Hash: 82fe8e39ccf81bdab1933997127f3b2fdc7726fdb7ef2b3b316420723d4de38f
                                                          • Instruction Fuzzy Hash: 61F08231244205DFD314EF75E885B5AB7E4EF59761F000029E859CB260DB70A845CB90
                                                          APIs
                                                          • GetForegroundWindow.USER32(00000001,?), ref: 001E1420
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ForegroundWindow
                                                          • String ID:
                                                          • API String ID: 2020703349-0
                                                          • Opcode ID: dc0c62333c292a53169afa7f7b1713e99b203ac2a601bbf56949f5124f0c33d9
                                                          • Instruction ID: 882514f565f472005aca5ff16c2b18b3a8e83606e17082c6463a900c9f1670b5
                                                          • Opcode Fuzzy Hash: dc0c62333c292a53169afa7f7b1713e99b203ac2a601bbf56949f5124f0c33d9
                                                          • Instruction Fuzzy Hash: 02316D30604642AFD714EF2AC891B69B7A2BF95329F048169E8254F392DB71EC45CBD1
                                                          APIs
                                                            • Part of subcall function 00154E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00154EDD,?,00221418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00154E9C
                                                            • Part of subcall function 00154E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00154EAE
                                                            • Part of subcall function 00154E90: FreeLibrary.KERNEL32(00000000,?,?,00154EDD,?,00221418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00154EC0
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00221418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00154EFD
                                                            • Part of subcall function 00154E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00193CDE,?,00221418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00154E62
                                                            • Part of subcall function 00154E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00154E74
                                                            • Part of subcall function 00154E59: FreeLibrary.KERNEL32(00000000,?,?,00193CDE,?,00221418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00154E87
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$Load$AddressFreeProc
                                                          • String ID:
                                                          • API String ID: 2632591731-0
                                                          • Opcode ID: f32eeda59d358b207b6d847c99ae75751666db2f49ae4877ae19baa38fbebb68
                                                          • Instruction ID: 501098067aefdcdbef2e4c27f7a51e3fbaababab33a5ad6c587006d69eddd621
                                                          • Opcode Fuzzy Hash: f32eeda59d358b207b6d847c99ae75751666db2f49ae4877ae19baa38fbebb68
                                                          • Instruction Fuzzy Hash: DE112731600205EBCF14AB68DC03FAD77A59F60716F10842EF962AE1C1EF749A899B90
                                                          APIs
                                                          • ShowWindow.USER32(?,00000000,00000001,?), ref: 001E26E0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: 9db755e4467249b6508c802bb6c35f411cbd12fe1fb52fab0cb07e4d34a58369
                                                          • Instruction ID: 4539dce3a0e394e29df6cdd63a42bf03b89a642de5b2d2782d3c1fa129268c75
                                                          • Opcode Fuzzy Hash: 9db755e4467249b6508c802bb6c35f411cbd12fe1fb52fab0cb07e4d34a58369
                                                          • Instruction Fuzzy Hash: 2B11E270200A819FD714EF2AC8A1F2EB7A9FB98364F54415DE8168F652C771EC81CB90
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: __wsopen_s
                                                          • String ID:
                                                          • API String ID: 3347428461-0
                                                          • Opcode ID: 80122547a7aed2b4037712062a4c4b51d6ddb010f8cf338af3cda2cc05d62ff4
                                                          • Instruction ID: 237f13ae5aae9d315b32253252335dde486ff305c5ad59a887ca06a2d954d51f
                                                          • Opcode Fuzzy Hash: 80122547a7aed2b4037712062a4c4b51d6ddb010f8cf338af3cda2cc05d62ff4
                                                          • Instruction Fuzzy Hash: 4C11187690410AAFCF15DF58E945A9A7BF5EF48314F114059FC08AB312DB31EA11CBA5
                                                          APIs
                                                            • Part of subcall function 00184C7D: RtlAllocateHeap.NTDLL(00000008,00151129,00000000,?,00182E29,00000001,00000364,?,?,?,0017F2DE,00183863,00221444,?,0016FDF5,?), ref: 00184CBE
                                                          • _free.LIBCMT ref: 0018506C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap_free
                                                          • String ID:
                                                          • API String ID: 614378929-0
                                                          • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                          • Instruction ID: 266b106783a09d40fc3a11361281d71a201ecbff4244b16dab8b766888f416d1
                                                          • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                          • Instruction Fuzzy Hash: 1A0126726047056BE3219E699881A9AFBEDFB89370F25051DF19483280EB30AA05CBB4
                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,?,?,?,001E14B5,?), ref: 001E2A01
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ForegroundWindow
                                                          • String ID:
                                                          • API String ID: 2020703349-0
                                                          • Opcode ID: 06a01a16a4766c4e2db7e2cda0d437450d7d35effe25dc08e77778b657d42fa6
                                                          • Instruction ID: a30add268c4de2c9c2139e6be8580e5ab5e7f3081d59d5afe1410210cf63d8e9
                                                          • Opcode Fuzzy Hash: 06a01a16a4766c4e2db7e2cda0d437450d7d35effe25dc08e77778b657d42fa6
                                                          • Instruction Fuzzy Hash: BA019236700ED19FD3248A2EC464F2A779AEBC5318F298468D0478B651D732EC42C790
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                          • Instruction ID: 9192162ffa43677d8bf2b1cab57c54a852e11a505a80a1161616c7fa7224d287
                                                          • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                          • Instruction Fuzzy Hash: F1F0F432510A14A6C7323A699C05B5A33F89F76334F218759F829931D2DB74D9028EA5
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000008,00151129,00000000,?,00182E29,00000001,00000364,?,?,?,0017F2DE,00183863,00221444,?,0016FDF5,?), ref: 00184CBE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: 4186f91697133df72af486308c6d68f2f8b73cec8d19e3f3014b224e4eae5759
                                                          • Instruction ID: 8db534bfd4602312ff9ad2ea16adc138193b03fff17381b268addba93e7c215b
                                                          • Opcode Fuzzy Hash: 4186f91697133df72af486308c6d68f2f8b73cec8d19e3f3014b224e4eae5759
                                                          • Instruction Fuzzy Hash: C3F0E231602226A7DB217F629C09F6B779CBF517B0B158125F819AA281CF30DA019FE0
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000000,?,00221444,?,0016FDF5,?,?,0015A976,00000010,00221440,001513FC,?,001513C6,?,00151129), ref: 00183852
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: 9ef2e33a7c6039a8854e25277eeb00b2972a405547d0d93aa9bd63c05781e6dd
                                                          • Instruction ID: ca1e5ffeb78cbc3c9f5ffbcdd1f886644a5b74298dc14cf5c30ea4e0e75842e8
                                                          • Opcode Fuzzy Hash: 9ef2e33a7c6039a8854e25277eeb00b2972a405547d0d93aa9bd63c05781e6dd
                                                          • Instruction Fuzzy Hash: 24E06531601224A7D63137A69C05B9B3659AB53FB0F1D4225BC39A65D1DB21DF028BE1
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,?,00221418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00154F6D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: f06c731ea1d0295a420e8a1efd795d577c73adf9c90e477d90118cc40548df0d
                                                          • Instruction ID: c274e3cab27d9c4fe7ca6e658373c3cfeed37e84bc4eb7e34f6a84454f370eab
                                                          • Opcode Fuzzy Hash: f06c731ea1d0295a420e8a1efd795d577c73adf9c90e477d90118cc40548df0d
                                                          • Instruction Fuzzy Hash: 9FF03071105751CFDB389F6CD490856B7F4AF1431E324897FE5EA8A511C7319888DF50
                                                          APIs
                                                          • IsWindow.USER32(00000000), ref: 001E2A66
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window
                                                          • String ID:
                                                          • API String ID: 2353593579-0
                                                          • Opcode ID: 79fdba2c3613d7660eec6ccef7b9c08b2a0065371dc1a76045bf5d0dc52410cf
                                                          • Instruction ID: c122ab9e257a02b32369f82f3ead8a2fdbd1d75c226d16c55bc4bb1171bcd0a9
                                                          • Opcode Fuzzy Hash: 79fdba2c3613d7660eec6ccef7b9c08b2a0065371dc1a76045bf5d0dc52410cf
                                                          • Instruction Fuzzy Hash: BBE0DF36340556ABC714EA31EC908FE734CEBA0398704443AEC26C3500DB30999182E0
                                                          APIs
                                                          • Shell_NotifyIconW.SHELL32(00000002,?), ref: 0015314E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_
                                                          • String ID:
                                                          • API String ID: 1144537725-0
                                                          • Opcode ID: 050d4b4db50c28e5ae96b3b90c77079c696bee7f5028e7bfc121455c1a76b6d6
                                                          • Instruction ID: c1f4b7135ad379ed69f02c171d4136c2ea59627b5c5ae35e4d591989b214af0d
                                                          • Opcode Fuzzy Hash: 050d4b4db50c28e5ae96b3b90c77079c696bee7f5028e7bfc121455c1a76b6d6
                                                          • Instruction Fuzzy Hash: FEF0A770900348AFE762DB64EC49BD97BBCA701708F0000E5A54897181D7704799CF41
                                                          APIs
                                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00152DC4
                                                            • Part of subcall function 00156B57: _wcslen.LIBCMT ref: 00156B6A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: LongNamePath_wcslen
                                                          • String ID:
                                                          • API String ID: 541455249-0
                                                          • Opcode ID: 63b820c59a015440930083b23cc156460eca80ee5d47d6f3796c1450b1e73343
                                                          • Instruction ID: 0f8d8b00ee095c2fad70037e07bc94a94d6d71952ed2b50350fbd9ea1d371ab0
                                                          • Opcode Fuzzy Hash: 63b820c59a015440930083b23cc156460eca80ee5d47d6f3796c1450b1e73343
                                                          • Instruction Fuzzy Hash: 1FE0CD726001245BCB1092989C06FEA77DDDFC8790F040071FD09D7248DA70ADC48590
                                                          APIs
                                                            • Part of subcall function 00153837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00153908
                                                            • Part of subcall function 0015D730: GetInputState.USER32 ref: 0015D807
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00152B6B
                                                            • Part of subcall function 001530F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0015314E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                          • String ID:
                                                          • API String ID: 3667716007-0
                                                          • Opcode ID: ca8f35003897ed88ce3060dd21152de808bc4bfafd6b44802d12217b5ac19837
                                                          • Instruction ID: 6a5e2ced6c320aa542ad8b84e63477d3500cb0dcd2ff9d8b2cef9be1383cd4d6
                                                          • Opcode Fuzzy Hash: ca8f35003897ed88ce3060dd21152de808bc4bfafd6b44802d12217b5ac19837
                                                          • Instruction Fuzzy Hash: 64E0262230024492C608BBB0B8528ADB7599BF1393F40153EF8768F1A3CF20459EC352
                                                          APIs
                                                          • CreateFileW.KERNELBASE(00000000,00000000,?,00190704,?,?,00000000,?,00190704,00000000,0000000C), ref: 001903B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: 92ad80be1a8b5e84785cd9e18822406134445285d4fa554f582d6f6398a23406
                                                          • Instruction ID: 263ca8a7be3c85cdedb0e1741aa2d76239c49ba3c2e2e45523dbede234988dcb
                                                          • Opcode Fuzzy Hash: 92ad80be1a8b5e84785cd9e18822406134445285d4fa554f582d6f6398a23406
                                                          • Instruction Fuzzy Hash: A8D06C3204014DFBDF029F84DD46EDA3FAAFB48714F014000BE1856020C732E862AB91
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00151CBC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: InfoParametersSystem
                                                          • String ID:
                                                          • API String ID: 3098949447-0
                                                          • Opcode ID: b3970d8e762584551636f77641a773482374235680d34a3536d592eef430d3c5
                                                          • Instruction ID: 5095d367b59a5931935b5d184ef67e570825c68cac49f9b677528450d7295d32
                                                          • Opcode Fuzzy Hash: b3970d8e762584551636f77641a773482374235680d34a3536d592eef430d3c5
                                                          • Instruction Fuzzy Hash: 0AC09B35380345FFF23487C0BC4EF147755A75CB00F449001F609695E3C3A21471D690
                                                          APIs
                                                            • Part of subcall function 00169BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00169BB2
                                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 001E961A
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 001E965B
                                                          • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 001E969F
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001E96C9
                                                          • SendMessageW.USER32 ref: 001E96F2
                                                          • GetKeyState.USER32(00000011), ref: 001E978B
                                                          • GetKeyState.USER32(00000009), ref: 001E9798
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 001E97AE
                                                          • GetKeyState.USER32(00000010), ref: 001E97B8
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001E97E9
                                                          • SendMessageW.USER32 ref: 001E9810
                                                          • SendMessageW.USER32(?,00001030,?,001E7E95), ref: 001E9918
                                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 001E992E
                                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 001E9941
                                                          • SetCapture.USER32(?), ref: 001E994A
                                                          • ClientToScreen.USER32(?,?), ref: 001E99AF
                                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 001E99BC
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 001E99D6
                                                          • ReleaseCapture.USER32 ref: 001E99E1
                                                          • GetCursorPos.USER32(?), ref: 001E9A19
                                                          • ScreenToClient.USER32(?,?), ref: 001E9A26
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 001E9A80
                                                          • SendMessageW.USER32 ref: 001E9AAE
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 001E9AEB
                                                          • SendMessageW.USER32 ref: 001E9B1A
                                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 001E9B3B
                                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 001E9B4A
                                                          • GetCursorPos.USER32(?), ref: 001E9B68
                                                          • ScreenToClient.USER32(?,?), ref: 001E9B75
                                                          • GetParent.USER32(?), ref: 001E9B93
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 001E9BFA
                                                          • SendMessageW.USER32 ref: 001E9C2B
                                                          • ClientToScreen.USER32(?,?), ref: 001E9C84
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 001E9CB4
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 001E9CDE
                                                          • SendMessageW.USER32 ref: 001E9D01
                                                          • ClientToScreen.USER32(?,?), ref: 001E9D4E
                                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 001E9D82
                                                            • Part of subcall function 00169944: GetWindowLongW.USER32(?,000000EB), ref: 00169952
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 001E9E05
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                          • String ID: @GUI_DRAGID$F$p#"
                                                          • API String ID: 3429851547-1047118953
                                                          • Opcode ID: 7c7c4c579d1bf95f24224205720e7e107deeda4b4aef068e47f0d70e960e33b0
                                                          • Instruction ID: 279d97150fe9a2c962686be5d7b86b5a0e154bd01ffcf9c16e3175b489333b5b
                                                          • Opcode Fuzzy Hash: 7c7c4c579d1bf95f24224205720e7e107deeda4b4aef068e47f0d70e960e33b0
                                                          • Instruction Fuzzy Hash: 91428C70604680AFD724CF66CC84EAEBBF5FF49310F14061AFA598B2A1D77198A5CF81
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 001E48F3
                                                          • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 001E4908
                                                          • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 001E4927
                                                          • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 001E494B
                                                          • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 001E495C
                                                          • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 001E497B
                                                          • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 001E49AE
                                                          • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 001E49D4
                                                          • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 001E4A0F
                                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 001E4A56
                                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 001E4A7E
                                                          • IsMenu.USER32(?), ref: 001E4A97
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 001E4AF2
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 001E4B20
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 001E4B94
                                                          • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 001E4BE3
                                                          • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 001E4C82
                                                          • wsprintfW.USER32 ref: 001E4CAE
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 001E4CC9
                                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 001E4CF1
                                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 001E4D13
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 001E4D33
                                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 001E4D5A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                          • String ID: %d/%02d/%02d
                                                          • API String ID: 4054740463-328681919
                                                          • Opcode ID: 7483bcb825beef74b93fe145693805d2454a3532fdc89c1223502cdadc95a313
                                                          • Instruction ID: 79083e14ba169be7842d394b5b2c23bfa05bba7b125f48832ccfb2d3e4092715
                                                          • Opcode Fuzzy Hash: 7483bcb825beef74b93fe145693805d2454a3532fdc89c1223502cdadc95a313
                                                          • Instruction Fuzzy Hash: 9912F231A00684ABEB248F69DC49FAF7BF8EF49710F144129F916EB2E1D7749941CB50
                                                          APIs
                                                            • Part of subcall function 001B16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 001B170D
                                                            • Part of subcall function 001B16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 001B173A
                                                            • Part of subcall function 001B16C3: GetLastError.KERNEL32 ref: 001B174A
                                                          • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 001B1286
                                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 001B12A8
                                                          • CloseHandle.KERNEL32(?), ref: 001B12B9
                                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 001B12D1
                                                          • GetProcessWindowStation.USER32 ref: 001B12EA
                                                          • SetProcessWindowStation.USER32(00000000), ref: 001B12F4
                                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 001B1310
                                                            • Part of subcall function 001B10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,001B11FC), ref: 001B10D4
                                                            • Part of subcall function 001B10BF: CloseHandle.KERNEL32(?,?,001B11FC), ref: 001B10E9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                          • String ID: $default$winsta0$Z!
                                                          • API String ID: 22674027-3215132610
                                                          • Opcode ID: a0ca423ed5b901a5cf2ac82c74b186699c0666767a2d833bb3b4c27afb33f5f0
                                                          • Instruction ID: 9105ee5edfa453d83b831d06af66bc9ea284ba980c8a85a69b11ae768dd9df97
                                                          • Opcode Fuzzy Hash: a0ca423ed5b901a5cf2ac82c74b186699c0666767a2d833bb3b4c27afb33f5f0
                                                          • Instruction Fuzzy Hash: F6818B71900249BFDF219FA4DC99FEE7BB9FF08704F154129F910A62A0DB718A95CB60
                                                          APIs
                                                            • Part of subcall function 001B10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 001B1114
                                                            • Part of subcall function 001B10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,001B0B9B,?,?,?), ref: 001B1120
                                                            • Part of subcall function 001B10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,001B0B9B,?,?,?), ref: 001B112F
                                                            • Part of subcall function 001B10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,001B0B9B,?,?,?), ref: 001B1136
                                                            • Part of subcall function 001B10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 001B114D
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 001B0BCC
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 001B0C00
                                                          • GetLengthSid.ADVAPI32(?), ref: 001B0C17
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 001B0C51
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 001B0C6D
                                                          • GetLengthSid.ADVAPI32(?), ref: 001B0C84
                                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 001B0C8C
                                                          • HeapAlloc.KERNEL32(00000000), ref: 001B0C93
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 001B0CB4
                                                          • CopySid.ADVAPI32(00000000), ref: 001B0CBB
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 001B0CEA
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 001B0D0C
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 001B0D1E
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001B0D45
                                                          • HeapFree.KERNEL32(00000000), ref: 001B0D4C
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001B0D55
                                                          • HeapFree.KERNEL32(00000000), ref: 001B0D5C
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001B0D65
                                                          • HeapFree.KERNEL32(00000000), ref: 001B0D6C
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 001B0D78
                                                          • HeapFree.KERNEL32(00000000), ref: 001B0D7F
                                                            • Part of subcall function 001B1193: GetProcessHeap.KERNEL32(00000008,001B0BB1,?,00000000,?,001B0BB1,?), ref: 001B11A1
                                                            • Part of subcall function 001B1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,001B0BB1,?), ref: 001B11A8
                                                            • Part of subcall function 001B1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,001B0BB1,?), ref: 001B11B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                          • String ID:
                                                          • API String ID: 4175595110-0
                                                          • Opcode ID: 424fbaa48e33db09396dd5ce3b43a5bd04a0ec4b881c71cf12a0398e6243f98d
                                                          • Instruction ID: e85c926202946918aaaaf372646a74cb385abfe11c4194fb40c47030a80f5435
                                                          • Opcode Fuzzy Hash: 424fbaa48e33db09396dd5ce3b43a5bd04a0ec4b881c71cf12a0398e6243f98d
                                                          • Instruction Fuzzy Hash: B2716B7690020AABDF11DFE4DC84BEFBBB8BF09310F044515F915AA1A1D771AA46CBA0
                                                          APIs
                                                          • OpenClipboard.USER32(001ECC08), ref: 001CEB29
                                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 001CEB37
                                                          • GetClipboardData.USER32(0000000D), ref: 001CEB43
                                                          • CloseClipboard.USER32 ref: 001CEB4F
                                                          • GlobalLock.KERNEL32(00000000), ref: 001CEB87
                                                          • CloseClipboard.USER32 ref: 001CEB91
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 001CEBBC
                                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 001CEBC9
                                                          • GetClipboardData.USER32(00000001), ref: 001CEBD1
                                                          • GlobalLock.KERNEL32(00000000), ref: 001CEBE2
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 001CEC22
                                                          • IsClipboardFormatAvailable.USER32(0000000F), ref: 001CEC38
                                                          • GetClipboardData.USER32(0000000F), ref: 001CEC44
                                                          • GlobalLock.KERNEL32(00000000), ref: 001CEC55
                                                          • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 001CEC77
                                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 001CEC94
                                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 001CECD2
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 001CECF3
                                                          • CountClipboardFormats.USER32 ref: 001CED14
                                                          • CloseClipboard.USER32 ref: 001CED59
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                          • String ID:
                                                          • API String ID: 420908878-0
                                                          • Opcode ID: 3fa127d3b071b0cdee6813af2fdf217bb8de672520feed363cba390c4ee90b52
                                                          • Instruction ID: b52ee8486c02a4bbff46c1c70372c36913a94d289e6207ee75a2f7f202f06d9e
                                                          • Opcode Fuzzy Hash: 3fa127d3b071b0cdee6813af2fdf217bb8de672520feed363cba390c4ee90b52
                                                          • Instruction Fuzzy Hash: 2B619D342042429FD310EFA4DC85F7A77E4AFA4714F14451DF8669B2A2DB31DD8ACBA2
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 001C69BE
                                                          • FindClose.KERNEL32(00000000), ref: 001C6A12
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 001C6A4E
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 001C6A75
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 001C6AB2
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 001C6ADF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                          • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                          • API String ID: 3830820486-3289030164
                                                          • Opcode ID: 3c206e481cd911739daa3c373707ecef4cd55955af9806c6fd752ca51386184f
                                                          • Instruction ID: ede99f6efc3b507eb69c58265ab1bb8cc1c1694130bedb3542276015a1c5e269
                                                          • Opcode Fuzzy Hash: 3c206e481cd911739daa3c373707ecef4cd55955af9806c6fd752ca51386184f
                                                          • Instruction Fuzzy Hash: 0DD15071508300AEC314DBA4DC82EAFB7E8AFA8705F44491DF995CB191EB74DA48C7A2
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 001C9663
                                                          • GetFileAttributesW.KERNEL32(?), ref: 001C96A1
                                                          • SetFileAttributesW.KERNEL32(?,?), ref: 001C96BB
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 001C96D3
                                                          • FindClose.KERNEL32(00000000), ref: 001C96DE
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 001C96FA
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 001C974A
                                                          • SetCurrentDirectoryW.KERNEL32(00216B7C), ref: 001C9768
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 001C9772
                                                          • FindClose.KERNEL32(00000000), ref: 001C977F
                                                          • FindClose.KERNEL32(00000000), ref: 001C978F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                          • String ID: *.*
                                                          • API String ID: 1409584000-438819550
                                                          • Opcode ID: a0875ab335729fed06abc33b7698cacb29cdcf37b3b4eb0621efc9c2fbb20c7d
                                                          • Instruction ID: 55954cf24a365900b1bbc544dc4939497ab7b6ea0c1479575ac82afad1bc5e79
                                                          • Opcode Fuzzy Hash: a0875ab335729fed06abc33b7698cacb29cdcf37b3b4eb0621efc9c2fbb20c7d
                                                          • Instruction Fuzzy Hash: 2731DF3254125AAACB14AFF4DC4DEDE77ACAF19320F104059E914E60A0DB70DE818E94
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 001C97BE
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 001C9819
                                                          • FindClose.KERNEL32(00000000), ref: 001C9824
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 001C9840
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 001C9890
                                                          • SetCurrentDirectoryW.KERNEL32(00216B7C), ref: 001C98AE
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 001C98B8
                                                          • FindClose.KERNEL32(00000000), ref: 001C98C5
                                                          • FindClose.KERNEL32(00000000), ref: 001C98D5
                                                            • Part of subcall function 001BDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 001BDB00
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                          • String ID: *.*
                                                          • API String ID: 2640511053-438819550
                                                          • Opcode ID: d95f823b25e9b20222e8a974e1e2374fc93aa01a22958857989c0ea7bc4a903f
                                                          • Instruction ID: b41d630f7744eeec3afe4bd7041c9a53935a670594df71fe497f711e8abff7e2
                                                          • Opcode Fuzzy Hash: d95f823b25e9b20222e8a974e1e2374fc93aa01a22958857989c0ea7bc4a903f
                                                          • Instruction Fuzzy Hash: B831E13250069EAADB10AFB4EC4DFDE77ACAF26320F108159E914A30D1DB71DE858A64
                                                          APIs
                                                            • Part of subcall function 001DC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,001DB6AE,?,?), ref: 001DC9B5
                                                            • Part of subcall function 001DC998: _wcslen.LIBCMT ref: 001DC9F1
                                                            • Part of subcall function 001DC998: _wcslen.LIBCMT ref: 001DCA68
                                                            • Part of subcall function 001DC998: _wcslen.LIBCMT ref: 001DCA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001DBF3E
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 001DBFA9
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 001DBFCD
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 001DC02C
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 001DC0E7
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 001DC154
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 001DC1E9
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 001DC23A
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 001DC2E3
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 001DC382
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 001DC38F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                          • String ID:
                                                          • API String ID: 3102970594-0
                                                          • Opcode ID: 0c86737d302735599f81086e6c3466a749a58ff64ddd9ef91cbbcfe33ec44754
                                                          • Instruction ID: 15635fce2e1cc84095b97bab2fdd0b92282964ede9f4703f54ced1d569b6d1b3
                                                          • Opcode Fuzzy Hash: 0c86737d302735599f81086e6c3466a749a58ff64ddd9ef91cbbcfe33ec44754
                                                          • Instruction Fuzzy Hash: E0023C71604201EFD714CF28C895E2ABBE5AF49318F19889DF85A8F3A2D731ED45CB91
                                                          APIs
                                                          • GetLocalTime.KERNEL32(?), ref: 001C8257
                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 001C8267
                                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 001C8273
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 001C8310
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 001C8324
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 001C8356
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 001C838C
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 001C8395
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryTime$File$Local$System
                                                          • String ID: *.*
                                                          • API String ID: 1464919966-438819550
                                                          • Opcode ID: 6517d764fe60f7c8030f16a84aac0dcb98d34eb60eeb5e5be57fe7dbc5f55f35
                                                          • Instruction ID: 631fa9b0e7218815ae8d74771f6bacdd26f1ae552c13aeea003fb732116d9ff5
                                                          • Opcode Fuzzy Hash: 6517d764fe60f7c8030f16a84aac0dcb98d34eb60eeb5e5be57fe7dbc5f55f35
                                                          • Instruction Fuzzy Hash: 8D618D715143459FC710EF64D884EAEB3E8FFA9310F04881EF99987251EB31E949CB92
                                                          APIs
                                                            • Part of subcall function 00153AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00153A97,?,?,00152E7F,?,?,?,00000000), ref: 00153AC2
                                                            • Part of subcall function 001BE199: GetFileAttributesW.KERNEL32(?,001BCF95), ref: 001BE19A
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 001BD122
                                                          • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 001BD1DD
                                                          • MoveFileW.KERNEL32(?,?), ref: 001BD1F0
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 001BD20D
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 001BD237
                                                            • Part of subcall function 001BD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,001BD21C,?,?), ref: 001BD2B2
                                                          • FindClose.KERNEL32(00000000,?,?,?), ref: 001BD253
                                                          • FindClose.KERNEL32(00000000), ref: 001BD264
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 1946585618-1173974218
                                                          • Opcode ID: acee6ecf1205a955fd102b88fec908fe313efe80d9a39f42fe1975be56589274
                                                          • Instruction ID: 10f6049485debdbb7d8d068a47dae82dcce15a862d70293689e2f54112e65920
                                                          • Opcode Fuzzy Hash: acee6ecf1205a955fd102b88fec908fe313efe80d9a39f42fe1975be56589274
                                                          • Instruction Fuzzy Hash: 4A616E3180114DEBCF09EBE0ED929EDB7B5AF25305F6041A5E8127B192EB309F49CB61
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                          • String ID:
                                                          • API String ID: 1737998785-0
                                                          • Opcode ID: 4491312509fa7833efb0df3316c5a74ad42b492f25fb97aa9e21489763a5ca9c
                                                          • Instruction ID: bc904c38d51d00df5a90d8906bfcdd02f592ed1869a5f704d955e96fb1c58be3
                                                          • Opcode Fuzzy Hash: 4491312509fa7833efb0df3316c5a74ad42b492f25fb97aa9e21489763a5ca9c
                                                          • Instruction Fuzzy Hash: DF419D31204251AFD720DF55D889F2ABBE1EF54358F14809DE8268FA62C735EC82CBD0
                                                          APIs
                                                            • Part of subcall function 001B16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 001B170D
                                                            • Part of subcall function 001B16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 001B173A
                                                            • Part of subcall function 001B16C3: GetLastError.KERNEL32 ref: 001B174A
                                                          • ExitWindowsEx.USER32(?,00000000), ref: 001BE932
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                          • String ID: $ $@$SeShutdownPrivilege
                                                          • API String ID: 2234035333-3163812486
                                                          • Opcode ID: d246d29cdf8dff98294542e5aa11ff17d8d71a180b02c0de9fedc5728404da5e
                                                          • Instruction ID: 250e3ff05877f975ac3ae262b09e96de3e3dc1b2fbcee6b75fd64deb8ed9de82
                                                          • Opcode Fuzzy Hash: d246d29cdf8dff98294542e5aa11ff17d8d71a180b02c0de9fedc5728404da5e
                                                          • Instruction Fuzzy Hash: 3E01D673610311AFEB5826B49C8ABFF72DCAB14758F160422F913E61D1D7A05C8885D0
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000001,00000006), ref: 001D1276
                                                          • WSAGetLastError.WSOCK32 ref: 001D1283
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 001D12BA
                                                          • WSAGetLastError.WSOCK32 ref: 001D12C5
                                                          • closesocket.WSOCK32(00000000), ref: 001D12F4
                                                          • listen.WSOCK32(00000000,00000005), ref: 001D1303
                                                          • WSAGetLastError.WSOCK32 ref: 001D130D
                                                          • closesocket.WSOCK32(00000000), ref: 001D133C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$closesocket$bindlistensocket
                                                          • String ID:
                                                          • API String ID: 540024437-0
                                                          • Opcode ID: 33eb14acc38c5fa0b4f8b4d93dd902e12cf82fe67d35e261b38bb9d8f45fd821
                                                          • Instruction ID: 2824b1ddf449cbe5d90ddc281371746f36721b56db1a5eca6484104ad14ef15a
                                                          • Opcode Fuzzy Hash: 33eb14acc38c5fa0b4f8b4d93dd902e12cf82fe67d35e261b38bb9d8f45fd821
                                                          • Instruction Fuzzy Hash: 89416E31600240BFD714DF64D9C4B29BBE6AF46318F288189E8568F392C771ED86CBE1
                                                          APIs
                                                            • Part of subcall function 00153AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00153A97,?,?,00152E7F,?,?,?,00000000), ref: 00153AC2
                                                            • Part of subcall function 001BE199: GetFileAttributesW.KERNEL32(?,001BCF95), ref: 001BE19A
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 001BD420
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 001BD470
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 001BD481
                                                          • FindClose.KERNEL32(00000000), ref: 001BD498
                                                          • FindClose.KERNEL32(00000000), ref: 001BD4A1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 2649000838-1173974218
                                                          • Opcode ID: 0149f194342dd33c1115827d969cce777fe77bd484e969be630d2f22c8f48617
                                                          • Instruction ID: 8e1928faaa61526c1fe3562a54a7601e2343824e696ea88b82348d5551492a0a
                                                          • Opcode Fuzzy Hash: 0149f194342dd33c1115827d969cce777fe77bd484e969be630d2f22c8f48617
                                                          • Instruction Fuzzy Hash: ED315071008385DBC304EF64D8918EF77E8BEA5315F844A2DF8E597191EB20AA0DC7A3
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: __floor_pentium4
                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                          • API String ID: 4168288129-2761157908
                                                          • Opcode ID: 93cb1c46b9e5e13d8024ebc4a86ea0e8a6ec144539d1401132164a8017ee99bf
                                                          • Instruction ID: 0d67b57e32c1b7215673050b53335ccb7e66ec660e97ca35eb17efe3af968a72
                                                          • Opcode Fuzzy Hash: 93cb1c46b9e5e13d8024ebc4a86ea0e8a6ec144539d1401132164a8017ee99bf
                                                          • Instruction Fuzzy Hash: E1C22A71E086288FDB29DE28DD447EAB7B5EB49305F1541EAD84DE7240E774AF828F40
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 001C64DC
                                                          • CoInitialize.OLE32(00000000), ref: 001C6639
                                                          • CoCreateInstance.OLE32(001EFCF8,00000000,00000001,001EFB68,?), ref: 001C6650
                                                          • CoUninitialize.OLE32 ref: 001C68D4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 886957087-24824748
                                                          • Opcode ID: f269b60f4b412a028ac788b171de0271ba79ac33755ff22e8e12b310379f5315
                                                          • Instruction ID: 9b8994dd53980e347a7bd9ef2b3789f0887e634f7e7562bfa3f5a9a73bbdb77e
                                                          • Opcode Fuzzy Hash: f269b60f4b412a028ac788b171de0271ba79ac33755ff22e8e12b310379f5315
                                                          • Instruction Fuzzy Hash: 5BD13971508301AFC304EF24C881E6BB7E9FFA9705F50496DF9958B291EB70E949CB92
                                                          APIs
                                                          • GetForegroundWindow.USER32(?,?,00000000), ref: 001D22E8
                                                            • Part of subcall function 001CE4EC: GetWindowRect.USER32(?,?), ref: 001CE504
                                                          • GetDesktopWindow.USER32 ref: 001D2312
                                                          • GetWindowRect.USER32(00000000), ref: 001D2319
                                                          • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 001D2355
                                                          • GetCursorPos.USER32(?), ref: 001D2381
                                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 001D23DF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                          • String ID:
                                                          • API String ID: 2387181109-0
                                                          • Opcode ID: e013cab2f8fa3cae4a554daa5faac9102685f9b56f84155f16e258eee19b9681
                                                          • Instruction ID: f9c07c8710d9d9a2e10f417a60e3b8b817a5220b3e61fe86275b92693d15ae2f
                                                          • Opcode Fuzzy Hash: e013cab2f8fa3cae4a554daa5faac9102685f9b56f84155f16e258eee19b9681
                                                          • Instruction Fuzzy Hash: 9C31CF72504355ABCB20DF54CC45B9BB7E9FF98314F00091AF9959B281DB34E949CBD2
                                                          APIs
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                          • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 001C9B78
                                                          • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 001C9C8B
                                                            • Part of subcall function 001C3874: GetInputState.USER32 ref: 001C38CB
                                                            • Part of subcall function 001C3874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 001C3966
                                                          • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 001C9BA8
                                                          • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 001C9C75
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                          • String ID: *.*
                                                          • API String ID: 1972594611-438819550
                                                          • Opcode ID: 8abffcfa6d2883f4cbc07e65b5286961b5821130041000374da561e245b797cd
                                                          • Instruction ID: bfbe55b58f696b5d16cb5ea3b184bef5cf8e25d0ef12880b6e97f59811b68495
                                                          • Opcode Fuzzy Hash: 8abffcfa6d2883f4cbc07e65b5286961b5821130041000374da561e245b797cd
                                                          • Instruction Fuzzy Hash: F7417E7190420AEBCF14DFA4C889FEEBBB4EF25311F204159E815A6191EB31DE85CBA4
                                                          APIs
                                                            • Part of subcall function 00169BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00169BB2
                                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 00169A4E
                                                          • GetSysColor.USER32(0000000F), ref: 00169B23
                                                          • SetBkColor.GDI32(?,00000000), ref: 00169B36
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$LongProcWindow
                                                          • String ID:
                                                          • API String ID: 3131106179-0
                                                          • Opcode ID: 790e4faa0e81b3b50514defcbd69403a941cf8e452adcd6897fb16e8bf2a00ff
                                                          • Instruction ID: 44a15f85a88c5a92fd172d527e7b4458376fb4b2c2849127a40e9710d6f2890e
                                                          • Opcode Fuzzy Hash: 790e4faa0e81b3b50514defcbd69403a941cf8e452adcd6897fb16e8bf2a00ff
                                                          • Instruction Fuzzy Hash: 40A10671208444BFE728AAAD9C9CE7F369DDB53300B16021AF502C76D1CB359E62C672
                                                          APIs
                                                            • Part of subcall function 001D304E: inet_addr.WSOCK32(?), ref: 001D307A
                                                            • Part of subcall function 001D304E: _wcslen.LIBCMT ref: 001D309B
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 001D185D
                                                          • WSAGetLastError.WSOCK32 ref: 001D1884
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 001D18DB
                                                          • WSAGetLastError.WSOCK32 ref: 001D18E6
                                                          • closesocket.WSOCK32(00000000), ref: 001D1915
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 1601658205-0
                                                          • Opcode ID: 524c8709c6816e60cba6a91478b6c1d9939614e38fd67cfebc168d441014fad2
                                                          • Instruction ID: d3abde47b7a8b9bf9dbb6058febb4e778c510e69e17f0cf00898e8a0277756ac
                                                          • Opcode Fuzzy Hash: 524c8709c6816e60cba6a91478b6c1d9939614e38fd67cfebc168d441014fad2
                                                          • Instruction Fuzzy Hash: 2351A071A00200AFDB10EF64D886F2A77E5AB58718F48805DF9155F3D3DB71AD428BE1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                          • String ID:
                                                          • API String ID: 292994002-0
                                                          • Opcode ID: 4060ece4fc90a3b873f8c4b965057dade70966dac7c6bb473e495ff5da0c2d00
                                                          • Instruction ID: 19510b2c76c8a6d85591cca520aef6554ac492868229785db59ea51f18c7b4f8
                                                          • Opcode Fuzzy Hash: 4060ece4fc90a3b873f8c4b965057dade70966dac7c6bb473e495ff5da0c2d00
                                                          • Instruction Fuzzy Hash: E3218231740A916FD7208F1BC894B6E7BA5BF95315B298068E846CB351C771EC82CB90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                          • API String ID: 0-1546025612
                                                          • Opcode ID: a280816d2047eeb631aab91fa2114c35197f7463e651139ff1a3ef53474c07a5
                                                          • Instruction ID: 537a44b064c303331cce422b7ee4cd13fde73b36ce28a5fc3f9f3a82b083f821
                                                          • Opcode Fuzzy Hash: a280816d2047eeb631aab91fa2114c35197f7463e651139ff1a3ef53474c07a5
                                                          • Instruction Fuzzy Hash: 77A28070E0061ACBDF25CF58C9807ADB7B2BF54315F2581A9EC25BB285EB709D85CB50
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 001B82AA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: lstrlen
                                                          • String ID: ($tb!$|
                                                          • API String ID: 1659193697-4054476356
                                                          • Opcode ID: 33aba86ea8fa958e24c6801b4fa4549d291f672375dc40197b5af3cbf301b3ff
                                                          • Instruction ID: 7ad4624306908a307f1f2c5d7fae134fb6b9cb67a3fa46e875f93df43a15572f
                                                          • Opcode Fuzzy Hash: 33aba86ea8fa958e24c6801b4fa4549d291f672375dc40197b5af3cbf301b3ff
                                                          • Instruction Fuzzy Hash: 02322775A00605DFC728DF59C481AAAB7F4FF48B10B15C56EE49ADB3A1EB70E981CB40
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 001DA6AC
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 001DA6BA
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 001DA79C
                                                          • CloseHandle.KERNEL32(00000000), ref: 001DA7AB
                                                            • Part of subcall function 0016CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00193303,?), ref: 0016CE8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                          • String ID:
                                                          • API String ID: 1991900642-0
                                                          • Opcode ID: 05aa67381aa2d26b9b377795adf588938911689e95b095b03b682bac854579ce
                                                          • Instruction ID: f79779971db662369d5db8a15bece0f87c69b7aaf9b38d1ac70d47b540af7d7e
                                                          • Opcode Fuzzy Hash: 05aa67381aa2d26b9b377795adf588938911689e95b095b03b682bac854579ce
                                                          • Instruction Fuzzy Hash: 31516C71508300EFD710EF24D886A6BBBE8FF99754F40491DF9999B252EB70D908CB92
                                                          APIs
                                                          • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 001BAAAC
                                                          • SetKeyboardState.USER32(00000080), ref: 001BAAC8
                                                          • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 001BAB36
                                                          • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 001BAB88
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: f1c9dc47794938a000995dbf99f6b7e781b72d45a494111d35cd1099ae68ba98
                                                          • Instruction ID: eba3e0e6f83b455b085a864aa64c0a34aea105aa19d058d50d192e65d19810a2
                                                          • Opcode Fuzzy Hash: f1c9dc47794938a000995dbf99f6b7e781b72d45a494111d35cd1099ae68ba98
                                                          • Instruction Fuzzy Hash: 58313730A80248AEFF35CB65CD45BFE7BAAAF48310F84421AF5A1961D0D3759D85C7A2
                                                          APIs
                                                          • _free.LIBCMT ref: 0018BB7F
                                                            • Part of subcall function 001829C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0018D7D1,00000000,00000000,00000000,00000000,?,0018D7F8,00000000,00000007,00000000,?,0018DBF5,00000000), ref: 001829DE
                                                            • Part of subcall function 001829C8: GetLastError.KERNEL32(00000000,?,0018D7D1,00000000,00000000,00000000,00000000,?,0018D7F8,00000000,00000007,00000000,?,0018DBF5,00000000,00000000), ref: 001829F0
                                                          • GetTimeZoneInformation.KERNEL32 ref: 0018BB91
                                                          • WideCharToMultiByte.KERNEL32(00000000,?,0022121C,000000FF,?,0000003F,?,?), ref: 0018BC09
                                                          • WideCharToMultiByte.KERNEL32(00000000,?,00221270,000000FF,?,0000003F,?,?,?,0022121C,000000FF,?,0000003F,?,?), ref: 0018BC36
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                          • String ID:
                                                          • API String ID: 806657224-0
                                                          • Opcode ID: bbaf9cabe5871c6bcfd121269fe38806ca7a417a43ebc2f1d7b76bd68ad8c7f1
                                                          • Instruction ID: a744c47bf4ac9a918cab322c97127f6483cf9904637e8e52caa8cd0903d1443a
                                                          • Opcode Fuzzy Hash: bbaf9cabe5871c6bcfd121269fe38806ca7a417a43ebc2f1d7b76bd68ad8c7f1
                                                          • Instruction Fuzzy Hash: AA319E70908255EFCB15EFA9ACC0969BBB8BF65310715426AF460DB2A1D7309A51CF50
                                                          APIs
                                                          • InternetReadFile.WININET(?,?,00000400,?), ref: 001CCE89
                                                          • GetLastError.KERNEL32(?,00000000), ref: 001CCEEA
                                                          • SetEvent.KERNEL32(?,?,00000000), ref: 001CCEFE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorEventFileInternetLastRead
                                                          • String ID:
                                                          • API String ID: 234945975-0
                                                          • Opcode ID: f2bda7f1f5815093911e0c6cde5d56d7d7f2cdbc154b883f0d9a066105f9a64d
                                                          • Instruction ID: f3dd7ab47a16324c9a616c4d148f51cfdbc35423217bfa8d4b534f5ebc07753e
                                                          • Opcode Fuzzy Hash: f2bda7f1f5815093911e0c6cde5d56d7d7f2cdbc154b883f0d9a066105f9a64d
                                                          • Instruction Fuzzy Hash: 3E21BD719003059BD720DFA5C988FAA7BF8EB61314F10841EE64AD6551E770EE45CBA0
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 001C5CC1
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 001C5D17
                                                          • FindClose.KERNEL32(?), ref: 001C5D5F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstNext
                                                          • String ID:
                                                          • API String ID: 3541575487-0
                                                          • Opcode ID: 47713eb1686de38bcde8413adfb7e1fbca18c452af9b1f83442c19afa072b426
                                                          • Instruction ID: 3aa5a40e9a81877dfe905de42779a6ed7a94c32b9cc077ea3eb1ae0c3185cb9c
                                                          • Opcode Fuzzy Hash: 47713eb1686de38bcde8413adfb7e1fbca18c452af9b1f83442c19afa072b426
                                                          • Instruction Fuzzy Hash: 8D5189346047019FC714CF68C894EAAB7E5FF19314F14855EE96A8B3A2CB30F985CB91
                                                          APIs
                                                          • IsDebuggerPresent.KERNEL32 ref: 0018271A
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00182724
                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 00182731
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                          • String ID:
                                                          • API String ID: 3906539128-0
                                                          • Opcode ID: 87c4ecdf8546e1b95c3ea30659d5f79569a847b4fd813c0876e129ec67fcf48b
                                                          • Instruction ID: 2e0e93659f5268022adf931b90bcf71c4fe7f2d16c43b9cb06fd36b2f5620cf3
                                                          • Opcode Fuzzy Hash: 87c4ecdf8546e1b95c3ea30659d5f79569a847b4fd813c0876e129ec67fcf48b
                                                          • Instruction Fuzzy Hash: D031B474951328ABCB21DF64DC8979DB7B8BF18310F5081EAE81CA7261E7309F818F45
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 001C51DA
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 001C5238
                                                          • SetErrorMode.KERNEL32(00000000), ref: 001C52A1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID:
                                                          • API String ID: 1682464887-0
                                                          • Opcode ID: e8e668b4601b23c38ce0f574e84d22a172d85f3a5361bcd5f7c4d69853ceca44
                                                          • Instruction ID: 765cc65b53c6edbaf20f4e4f7ae455fe4d61f71e1ba2a6f387c559e3cbd989ca
                                                          • Opcode Fuzzy Hash: e8e668b4601b23c38ce0f574e84d22a172d85f3a5361bcd5f7c4d69853ceca44
                                                          • Instruction Fuzzy Hash: 9A310975A00618DFDB00DF94D884EADBBF5FF59314F048099E805AF2A2DB31E85ACB91
                                                          APIs
                                                            • Part of subcall function 0016FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00170668
                                                            • Part of subcall function 0016FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00170685
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 001B170D
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 001B173A
                                                          • GetLastError.KERNEL32 ref: 001B174A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                          • String ID:
                                                          • API String ID: 577356006-0
                                                          • Opcode ID: 41161249f765dd4313de5910492e85ce4c9b8424882748dbed0ef3729a353b31
                                                          • Instruction ID: dc4db161f5a45bd7269fa87509e9129cad179ef4441af2565a9f268150a024c3
                                                          • Opcode Fuzzy Hash: 41161249f765dd4313de5910492e85ce4c9b8424882748dbed0ef3729a353b31
                                                          • Instruction Fuzzy Hash: 991191B2404304BFD718AF94ECC6DABB7BDEB45714B21852EF45657681EB70BC428B60
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 001BD608
                                                          • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 001BD645
                                                          • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 001BD650
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseControlCreateDeviceFileHandle
                                                          • String ID:
                                                          • API String ID: 33631002-0
                                                          • Opcode ID: 72fe3e8a5982f03c42408e34d9e3032dc0a07cb69a7ed1a1128890ebd2fb647c
                                                          • Instruction ID: 7accb0fec2b4bf41894f3732a82e6eabbd09bab834b209508cd83eb0436649da
                                                          • Opcode Fuzzy Hash: 72fe3e8a5982f03c42408e34d9e3032dc0a07cb69a7ed1a1128890ebd2fb647c
                                                          • Instruction Fuzzy Hash: 86113C75E05228BBDB148F95AC85FEFBFBCEB45B50F108115F904E7290D7704A058BA1
                                                          APIs
                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 001B168C
                                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 001B16A1
                                                          • FreeSid.ADVAPI32(?), ref: 001B16B1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                                          • String ID:
                                                          • API String ID: 3429775523-0
                                                          • Opcode ID: c6644a2e5a34488b4a3a10b85e61d13284a20a88ecec5c5820418322c17872f2
                                                          • Instruction ID: f0c3502245d358522e38f40fb83de7eb29c0cabb3634b64058d89c4596c47703
                                                          • Opcode Fuzzy Hash: c6644a2e5a34488b4a3a10b85e61d13284a20a88ecec5c5820418322c17872f2
                                                          • Instruction Fuzzy Hash: FDF0F475950309FBDB00DFE49C89AAEBBBCFB08704F504565E501E6181E774AA448A90
                                                          APIs
                                                          • GetUserNameW.ADVAPI32(?,?), ref: 001AD28C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: NameUser
                                                          • String ID: X64
                                                          • API String ID: 2645101109-893830106
                                                          • Opcode ID: 8d96aa1334d777ada449dcaff991e04b4b3da82e6d1f975c5c6701caa68e7455
                                                          • Instruction ID: da603a9316b1ca49e03ba00c6a7ae9b626bed7a79e83e9d299d45527a55fb86a
                                                          • Opcode Fuzzy Hash: 8d96aa1334d777ada449dcaff991e04b4b3da82e6d1f975c5c6701caa68e7455
                                                          • Instruction Fuzzy Hash: E2D0C9B880111DEACB94DB90ECC8DDEB37CBB04305F110152F506A2000DB3095498F50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                          • Instruction ID: 353e45805d69377230ec44f27d0e511099c3c35a3d332279eba0220d56fcbe14
                                                          • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                          • Instruction Fuzzy Hash: 06021B71E002199BDF24CFA9C8906ADFBF1EF58314F25816ED919E7384D731AA418BD4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Variable is not of type 'Object'.$p#"
                                                          • API String ID: 0-2226386633
                                                          • Opcode ID: a5f6d7b2d28701e149a667edb00a63f1a7972424c2257ced4afa37505c223cdd
                                                          • Instruction ID: e6788ab9e68f919d5ae92f26a5c0e20fefbddc94f7d5f6762ae3879121acd0a4
                                                          • Opcode Fuzzy Hash: a5f6d7b2d28701e149a667edb00a63f1a7972424c2257ced4afa37505c223cdd
                                                          • Instruction Fuzzy Hash: 6B327974900318DFCF19DF94C881AEDB7B5BF1A305F144059E826AF292D775AE49CBA0
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 001C6918
                                                          • FindClose.KERNEL32(00000000), ref: 001C6961
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: aedafde08dcd7b9990856c0ba85b717a0798850d58ce5772da3595ed1b633e8b
                                                          • Instruction ID: cb8cebed15263defe83a7d9a38091470666a780f663452734b99ad9b7b08e580
                                                          • Opcode Fuzzy Hash: aedafde08dcd7b9990856c0ba85b717a0798850d58ce5772da3595ed1b633e8b
                                                          • Instruction Fuzzy Hash: 8311BE316042019FC710CF69D885E1ABBE1EF98329F04C69DE8698F6A2C730EC45CBD0
                                                          APIs
                                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,001D4891,?,?,00000035,?), ref: 001C37E4
                                                          • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,001D4891,?,?,00000035,?), ref: 001C37F4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorFormatLastMessage
                                                          • String ID:
                                                          • API String ID: 3479602957-0
                                                          • Opcode ID: 929267a09dca4236884481de27772d90db3929d3b47556769a39ceaa1b5beae0
                                                          • Instruction ID: 0d806c60f141454299a9fe1ae095506f788598809ec2eb0a897d291245ee0e3b
                                                          • Opcode Fuzzy Hash: 929267a09dca4236884481de27772d90db3929d3b47556769a39ceaa1b5beae0
                                                          • Instruction Fuzzy Hash: EFF0E5B16043296AEB2017A68C8DFEB7AAEEFC5761F000165F519D2281DA609944C6F0
                                                          APIs
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,001B11FC), ref: 001B10D4
                                                          • CloseHandle.KERNEL32(?,?,001B11FC), ref: 001B10E9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                          • String ID:
                                                          • API String ID: 81990902-0
                                                          • Opcode ID: 31d9f6ba180838b707cbed5e18fca25cf5742795f2e2150263d2aa51ab7e76c3
                                                          • Instruction ID: 226fd330bbba92d0709267fe84b32f6bfd97537d7d80a80ee7159cb8d4d119a5
                                                          • Opcode Fuzzy Hash: 31d9f6ba180838b707cbed5e18fca25cf5742795f2e2150263d2aa51ab7e76c3
                                                          • Instruction Fuzzy Hash: 67E04F32004600AEE7252B51FC05EB77BA9FB04310B10882EF4A5844B1DB626CE1DB50
                                                          APIs
                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00186766,?,?,00000008,?,?,0018FEFE,00000000), ref: 00186998
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionRaise
                                                          • String ID:
                                                          • API String ID: 3997070919-0
                                                          • Opcode ID: 7efdca6b6de1e8e9f838ceb9e88d152baab41f40cf381180628403ae2db99702
                                                          • Instruction ID: 9bfe75c222f64e5ec982550b100e19866e543599ca4d78efbf4873f1714a709b
                                                          • Opcode Fuzzy Hash: 7efdca6b6de1e8e9f838ceb9e88d152baab41f40cf381180628403ae2db99702
                                                          • Instruction Fuzzy Hash: 7EB13B31610609DFD719DF28C48AB657BE0FF45368F258658E89ACF2A2C735EA91CF40
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID: 0-3916222277
                                                          • Opcode ID: 82aa001afdb5d6f65a5e020ab521dfae21cd02f4d58943eac68545285ed04267
                                                          • Instruction ID: 313af184affb30cb9f5ea653d44c337edcd3bb2866dcfb1bbdad865218d7e918
                                                          • Opcode Fuzzy Hash: 82aa001afdb5d6f65a5e020ab521dfae21cd02f4d58943eac68545285ed04267
                                                          • Instruction Fuzzy Hash: E0124075D042299BDB24CF58C8807EEB7F5FF48710F1581AAE849EB255EB309E91CB90
                                                          APIs
                                                          • BlockInput.USER32(00000001), ref: 001CEABD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: BlockInput
                                                          • String ID:
                                                          • API String ID: 3456056419-0
                                                          • Opcode ID: bcf00c57f613047c4544b588b4e39f11e078695fea6f1e51366c5ae0b102192a
                                                          • Instruction ID: 024d7c106a67a6646738c74a8a72d81279c34f3de4f4968b0fd84092d86be4b0
                                                          • Opcode Fuzzy Hash: bcf00c57f613047c4544b588b4e39f11e078695fea6f1e51366c5ae0b102192a
                                                          • Instruction Fuzzy Hash: 69E04F312102049FC710EF69D844E9AF7E9AFA8760F00841AFC49CB751DBB0E8458B90
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,001703EE), ref: 001709DA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: 802fb7797659b3b728709d5b70caf001c6ae58f0c7cc04cbf027d018100d0a5c
                                                          • Instruction ID: 154f79b0d7f5f09755330166283a257bd882121cb5ff6d08619dcd53b9fca18e
                                                          • Opcode Fuzzy Hash: 802fb7797659b3b728709d5b70caf001c6ae58f0c7cc04cbf027d018100d0a5c
                                                          • Instruction Fuzzy Hash:
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0
                                                          • API String ID: 0-4108050209
                                                          • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                          • Instruction ID: 51a7e498feb8b096793290e993707060369b2d86b0323a33945bddb6f5a2ed3a
                                                          • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                          • Instruction Fuzzy Hash: CF51887164C705ABDF388568C85EBBE63B99B12358F18C919E98EC72C2C711DE41D393
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0&"
                                                          • API String ID: 0-3449093698
                                                          • Opcode ID: 2627cc5f48510c8a37ac77796b6f6e8dfead87f0c9f1fb73ecefabd65589e713
                                                          • Instruction ID: cd654b31cc05e0e0be617e21116041658166cab8eb6d2b65d112cb4e55a30b73
                                                          • Opcode Fuzzy Hash: 2627cc5f48510c8a37ac77796b6f6e8dfead87f0c9f1fb73ecefabd65589e713
                                                          • Instruction Fuzzy Hash: 4821B7326206119BD728CF79D92367E73E9A764310F15862EE4A7C77D1DE3AE904CB80
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 77d7abe44138616d7bd2ef4e51195efccc77e87f9baa4961c8739b9fa3a81edc
                                                          • Instruction ID: 34283e9119d23779ff2c4252e097093873a9d9afd2a2f44c0ba8dc2d5cb560f4
                                                          • Opcode Fuzzy Hash: 77d7abe44138616d7bd2ef4e51195efccc77e87f9baa4961c8739b9fa3a81edc
                                                          • Instruction Fuzzy Hash: 4532F321D29F014DD723A634D822335A649AFB73C5F25D737E81AB5DAAEB39C5C38600
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6f49192fc4c1b10feb3632740c1fd46f237f3380d41a39de5cbd48247e7256cd
                                                          • Instruction ID: b2c1d17542a7bec7d5957da00b4372dac64ca418dcf669dc1f19bd9aa3f1f886
                                                          • Opcode Fuzzy Hash: 6f49192fc4c1b10feb3632740c1fd46f237f3380d41a39de5cbd48247e7256cd
                                                          • Instruction Fuzzy Hash: 5E32373AA041158BCF28CF6CC8946BD7BA1EF46314F29856AD49ADB391E730DD81DBD0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 314a0e8bd3ae0b78e49b280e904aa3cce8091a733e92b7c8328df19f5d657e42
                                                          • Instruction ID: 9ee16eb595346af47c890bd2842d56c3da12b36eb881c4dd2ae70674a3140bae
                                                          • Opcode Fuzzy Hash: 314a0e8bd3ae0b78e49b280e904aa3cce8091a733e92b7c8328df19f5d657e42
                                                          • Instruction Fuzzy Hash: CF22C2B0A04609DFDF14CF64D882AAEB7F6FF54301F144529E826EB291EB36AD15CB50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b8e3e2f8280d24b103d56052f44f935b56550597f1f0c11f67ba8dc5a509421d
                                                          • Instruction ID: ce52f3b31a2a47d720de1609251c19317ece2e914cea1ee3e4952525fa969d8d
                                                          • Opcode Fuzzy Hash: b8e3e2f8280d24b103d56052f44f935b56550597f1f0c11f67ba8dc5a509421d
                                                          • Instruction Fuzzy Hash: C402B6B1E00209EBDF04DF64D881AADBBF5FF54300F118169E816DB291EB31EA65CB95
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8cd5c29f7e84876c433d9bee6b35e664f3dcce33c76ffdad6d7147caafccac88
                                                          • Instruction ID: f1287b067714f99d941a7b98e3cd260437632ab916a9f1837bf1089897950f23
                                                          • Opcode Fuzzy Hash: 8cd5c29f7e84876c433d9bee6b35e664f3dcce33c76ffdad6d7147caafccac88
                                                          • Instruction Fuzzy Hash: 6DB1D120D2AF414DD62396398835336B65CBFBB6D5F91D71BFC2674D62EB2286C38240
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                          • Instruction ID: b353f8d3a72e557f59149b42d8492c632099f8f23664a6b0ca0e3bffe41ce1c6
                                                          • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                          • Instruction Fuzzy Hash: C59188731080A35ADB2E467E857907EFFF15A923A131A479DD4FACA1C1FF20C954DA20
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                          • Instruction ID: 2f5a88cf45f12962adebefe3254c12b56a43252c9d0b9f51007378b19c337009
                                                          • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                          • Instruction Fuzzy Hash: B49156732090A34ADB6D463D847403EFFF15A923A131A879EE4FACA1C5EF34C659D620
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                          • Instruction ID: 815156f3c3dd5adc3df66e13d35b1b868088af752db7552e44a448c99f7c8796
                                                          • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                          • Instruction Fuzzy Hash: B99130722090E25ADB2D467E857403DFEF15A923A131A879DD4FACB1C1FF248659D620
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0462ae075220569421503736d0015834fdb0a28793959f49ad4d55881531e2fe
                                                          • Instruction ID: 7104e99ce7bf15d4157ad1316843741d0bbf4cc2354614b711f26d50d2626b90
                                                          • Opcode Fuzzy Hash: 0462ae075220569421503736d0015834fdb0a28793959f49ad4d55881531e2fe
                                                          • Instruction Fuzzy Hash: 48616831748709A6EE38AA288C95BBE23B4DF55700F18C91AE94EDB2C1DB119F42C755
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 711debf40cff32ea406a9928e790c72c4170a930c4cb149341a94855b4854f48
                                                          • Instruction ID: db3063e48f74f371eb1fd36d67097496aded9c63a64ad7b6a5c993431ac33766
                                                          • Opcode Fuzzy Hash: 711debf40cff32ea406a9928e790c72c4170a930c4cb149341a94855b4854f48
                                                          • Instruction Fuzzy Hash: B861993124C709A6DE394AE8D855BBF23B4EF52744F10C85AE94ECB2C1EB12DD42C355
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                          • Instruction ID: f633d32736c9c6c9d2fbf2fc55baca527b92d4ba7fe3de46f20a2499283c0b80
                                                          • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                          • Instruction Fuzzy Hash: 7D8184336080A319DB6D463E853407EFFF15A923A531A879DD4FACB1C1EF24C659E620
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 001D2B30
                                                          • DeleteObject.GDI32(00000000), ref: 001D2B43
                                                          • DestroyWindow.USER32 ref: 001D2B52
                                                          • GetDesktopWindow.USER32 ref: 001D2B6D
                                                          • GetWindowRect.USER32(00000000), ref: 001D2B74
                                                          • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 001D2CA3
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 001D2CB1
                                                          • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001D2CF8
                                                          • GetClientRect.USER32(00000000,?), ref: 001D2D04
                                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 001D2D40
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001D2D62
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001D2D75
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001D2D80
                                                          • GlobalLock.KERNEL32(00000000), ref: 001D2D89
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001D2D98
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 001D2DA1
                                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001D2DA8
                                                          • GlobalFree.KERNEL32(00000000), ref: 001D2DB3
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001D2DC5
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,001EFC38,00000000), ref: 001D2DDB
                                                          • GlobalFree.KERNEL32(00000000), ref: 001D2DEB
                                                          • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 001D2E11
                                                          • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 001D2E30
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001D2E52
                                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001D303F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                          • String ID: $AutoIt v3$DISPLAY$static
                                                          • API String ID: 2211948467-2373415609
                                                          • Opcode ID: bdbce7ab3199b405c73918352b6fda58f087aff008c3610c3d916937fcd7f5a4
                                                          • Instruction ID: 93cb1c733b231ba24f17ad85398abc25f9440797df77b5f07980b71f74e5f624
                                                          • Opcode Fuzzy Hash: bdbce7ab3199b405c73918352b6fda58f087aff008c3610c3d916937fcd7f5a4
                                                          • Instruction Fuzzy Hash: C4028D71900205EFDB14DFA4DC89EAE7BB9FF58311F008559F925AB2A1D770AD42CBA0
                                                          APIs
                                                          • SetTextColor.GDI32(?,00000000), ref: 001E712F
                                                          • GetSysColorBrush.USER32(0000000F), ref: 001E7160
                                                          • GetSysColor.USER32(0000000F), ref: 001E716C
                                                          • SetBkColor.GDI32(?,000000FF), ref: 001E7186
                                                          • SelectObject.GDI32(?,?), ref: 001E7195
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 001E71C0
                                                          • GetSysColor.USER32(00000010), ref: 001E71C8
                                                          • CreateSolidBrush.GDI32(00000000), ref: 001E71CF
                                                          • FrameRect.USER32(?,?,00000000), ref: 001E71DE
                                                          • DeleteObject.GDI32(00000000), ref: 001E71E5
                                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 001E7230
                                                          • FillRect.USER32(?,?,?), ref: 001E7262
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 001E7284
                                                            • Part of subcall function 001E73E8: GetSysColor.USER32(00000012), ref: 001E7421
                                                            • Part of subcall function 001E73E8: SetTextColor.GDI32(?,?), ref: 001E7425
                                                            • Part of subcall function 001E73E8: GetSysColorBrush.USER32(0000000F), ref: 001E743B
                                                            • Part of subcall function 001E73E8: GetSysColor.USER32(0000000F), ref: 001E7446
                                                            • Part of subcall function 001E73E8: GetSysColor.USER32(00000011), ref: 001E7463
                                                            • Part of subcall function 001E73E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 001E7471
                                                            • Part of subcall function 001E73E8: SelectObject.GDI32(?,00000000), ref: 001E7482
                                                            • Part of subcall function 001E73E8: SetBkColor.GDI32(?,00000000), ref: 001E748B
                                                            • Part of subcall function 001E73E8: SelectObject.GDI32(?,?), ref: 001E7498
                                                            • Part of subcall function 001E73E8: InflateRect.USER32(?,000000FF,000000FF), ref: 001E74B7
                                                            • Part of subcall function 001E73E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 001E74CE
                                                            • Part of subcall function 001E73E8: GetWindowLongW.USER32(00000000,000000F0), ref: 001E74DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                          • String ID:
                                                          • API String ID: 4124339563-0
                                                          • Opcode ID: 88ddf72be2270f9fca0e27178a74bdb911625f6da6ae0cead44284877bca339a
                                                          • Instruction ID: a9449cc8ad0ee7238bf51cf2e7250b22b577f3f6b3cbcb47a3b0ae037e9a534a
                                                          • Opcode Fuzzy Hash: 88ddf72be2270f9fca0e27178a74bdb911625f6da6ae0cead44284877bca339a
                                                          • Instruction Fuzzy Hash: 15A1B472108741EFD7049FA0DC88E5F7BA9FF49720F100A19FA629A1E1D731D985CB91
                                                          APIs
                                                          • DestroyWindow.USER32(?,?), ref: 00168E14
                                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 001A6AC5
                                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 001A6AFE
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 001A6F43
                                                            • Part of subcall function 00168F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00168BE8,?,00000000,?,?,?,?,00168BBA,00000000,?), ref: 00168FC5
                                                          • SendMessageW.USER32(?,00001053), ref: 001A6F7F
                                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 001A6F96
                                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 001A6FAC
                                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 001A6FB7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                          • String ID: 0
                                                          • API String ID: 2760611726-4108050209
                                                          • Opcode ID: b01689f40c329f0fde5526cc91832acd6e4d17ac4e1a7ce6dad196f4613f04a0
                                                          • Instruction ID: 473aac98cc1af3dea423040815ac39ec440190bfae81421ca191733310bfa069
                                                          • Opcode Fuzzy Hash: b01689f40c329f0fde5526cc91832acd6e4d17ac4e1a7ce6dad196f4613f04a0
                                                          • Instruction Fuzzy Hash: 7912B038200251EFD725CF54DC98BAAB7E1FB5A310F184569F4858B661CB32ECA2CB91
                                                          APIs
                                                          • DestroyWindow.USER32(00000000), ref: 001D273E
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 001D286A
                                                          • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 001D28A9
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 001D28B9
                                                          • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 001D2900
                                                          • GetClientRect.USER32(00000000,?), ref: 001D290C
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 001D2955
                                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 001D2964
                                                          • GetStockObject.GDI32(00000011), ref: 001D2974
                                                          • SelectObject.GDI32(00000000,00000000), ref: 001D2978
                                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 001D2988
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 001D2991
                                                          • DeleteDC.GDI32(00000000), ref: 001D299A
                                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 001D29C6
                                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 001D29DD
                                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 001D2A1D
                                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 001D2A31
                                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 001D2A42
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 001D2A77
                                                          • GetStockObject.GDI32(00000011), ref: 001D2A82
                                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 001D2A8D
                                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 001D2A97
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                          • API String ID: 2910397461-517079104
                                                          • Opcode ID: 1b2810f6353bd85250225cfc6bf5ee3f62afb3181a3601218adaa97e1021ab11
                                                          • Instruction ID: 17cb5870b8562eb448c83c801850bed6b8b7020c03c95e6f60ef50bff37256ef
                                                          • Opcode Fuzzy Hash: 1b2810f6353bd85250225cfc6bf5ee3f62afb3181a3601218adaa97e1021ab11
                                                          • Instruction Fuzzy Hash: 39B14D71A00215BFEB24DFA8DC89FAE7BA9EF18711F004155F925EB290D774AD41CB90
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 001C4AED
                                                          • GetDriveTypeW.KERNEL32(?,001ECB68,?,\\.\,001ECC08), ref: 001C4BCA
                                                          • SetErrorMode.KERNEL32(00000000,001ECB68,?,\\.\,001ECC08), ref: 001C4D36
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DriveType
                                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                          • API String ID: 2907320926-4222207086
                                                          • Opcode ID: e2fb8bd397bdee21bb57ffdd2ec9c572f4d2103c7818c8e65998ec08802c32c1
                                                          • Instruction ID: bab4435372af537b66c9769d7ea0faaf7a15a1a38088cd0e74721ec1406a7f3f
                                                          • Opcode Fuzzy Hash: e2fb8bd397bdee21bb57ffdd2ec9c572f4d2103c7818c8e65998ec08802c32c1
                                                          • Instruction Fuzzy Hash: 0861E430619105DBCB18DF64DAA6FBD77F0AB35300B25401DF806AB6A1DB31ED91DB85
                                                          APIs
                                                          • GetSysColor.USER32(00000012), ref: 001E7421
                                                          • SetTextColor.GDI32(?,?), ref: 001E7425
                                                          • GetSysColorBrush.USER32(0000000F), ref: 001E743B
                                                          • GetSysColor.USER32(0000000F), ref: 001E7446
                                                          • CreateSolidBrush.GDI32(?), ref: 001E744B
                                                          • GetSysColor.USER32(00000011), ref: 001E7463
                                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 001E7471
                                                          • SelectObject.GDI32(?,00000000), ref: 001E7482
                                                          • SetBkColor.GDI32(?,00000000), ref: 001E748B
                                                          • SelectObject.GDI32(?,?), ref: 001E7498
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 001E74B7
                                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 001E74CE
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 001E74DB
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 001E752A
                                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 001E7554
                                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 001E7572
                                                          • DrawFocusRect.USER32(?,?), ref: 001E757D
                                                          • GetSysColor.USER32(00000011), ref: 001E758E
                                                          • SetTextColor.GDI32(?,00000000), ref: 001E7596
                                                          • DrawTextW.USER32(?,001E70F5,000000FF,?,00000000), ref: 001E75A8
                                                          • SelectObject.GDI32(?,?), ref: 001E75BF
                                                          • DeleteObject.GDI32(?), ref: 001E75CA
                                                          • SelectObject.GDI32(?,?), ref: 001E75D0
                                                          • DeleteObject.GDI32(?), ref: 001E75D5
                                                          • SetTextColor.GDI32(?,?), ref: 001E75DB
                                                          • SetBkColor.GDI32(?,?), ref: 001E75E5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 1996641542-0
                                                          • Opcode ID: 05b5f6413368c5ea7afebf02b658f8ce07531b10f3310511066c8bf3785ff6c5
                                                          • Instruction ID: 9e9bfa0b927b88eb5b451ceeb98e7c533c50149b534e23c2c99257dc8bcdc63f
                                                          • Opcode Fuzzy Hash: 05b5f6413368c5ea7afebf02b658f8ce07531b10f3310511066c8bf3785ff6c5
                                                          • Instruction Fuzzy Hash: 3B616B72900658AFEB059FA4DC89EEEBFB9EF08720F114115F911AB2E1D7709981DF90
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 001E1128
                                                          • GetDesktopWindow.USER32 ref: 001E113D
                                                          • GetWindowRect.USER32(00000000), ref: 001E1144
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 001E1199
                                                          • DestroyWindow.USER32(?), ref: 001E11B9
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 001E11ED
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 001E120B
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 001E121D
                                                          • SendMessageW.USER32(00000000,00000421,?,?), ref: 001E1232
                                                          • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 001E1245
                                                          • IsWindowVisible.USER32(00000000), ref: 001E12A1
                                                          • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 001E12BC
                                                          • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 001E12D0
                                                          • GetWindowRect.USER32(00000000,?), ref: 001E12E8
                                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 001E130E
                                                          • GetMonitorInfoW.USER32(00000000,?), ref: 001E1328
                                                          • CopyRect.USER32(?,?), ref: 001E133F
                                                          • SendMessageW.USER32(00000000,00000412,00000000), ref: 001E13AA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                          • String ID: ($0$tooltips_class32
                                                          • API String ID: 698492251-4156429822
                                                          • Opcode ID: f399afb9ab7c2b6a135886147c178710555e6e8ac1ec5143bf23919f1a0ab41a
                                                          • Instruction ID: db30d930097fb3911154dec201ef2e76b74d6876501bfdd7ead7364d144a3d93
                                                          • Opcode Fuzzy Hash: f399afb9ab7c2b6a135886147c178710555e6e8ac1ec5143bf23919f1a0ab41a
                                                          • Instruction Fuzzy Hash: E1B17971608781AFDB14DF65C884B6FBBE5FF88350F008918F9999B2A1D731E845CB92
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00168968
                                                          • GetSystemMetrics.USER32(00000007), ref: 00168970
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0016899B
                                                          • GetSystemMetrics.USER32(00000008), ref: 001689A3
                                                          • GetSystemMetrics.USER32(00000004), ref: 001689C8
                                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 001689E5
                                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 001689F5
                                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00168A28
                                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00168A3C
                                                          • GetClientRect.USER32(00000000,000000FF), ref: 00168A5A
                                                          • GetStockObject.GDI32(00000011), ref: 00168A76
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00168A81
                                                            • Part of subcall function 0016912D: GetCursorPos.USER32(?), ref: 00169141
                                                            • Part of subcall function 0016912D: ScreenToClient.USER32(00000000,?), ref: 0016915E
                                                            • Part of subcall function 0016912D: GetAsyncKeyState.USER32(00000001), ref: 00169183
                                                            • Part of subcall function 0016912D: GetAsyncKeyState.USER32(00000002), ref: 0016919D
                                                          • SetTimer.USER32(00000000,00000000,00000028,001690FC), ref: 00168AA8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                          • String ID: AutoIt v3 GUI
                                                          • API String ID: 1458621304-248962490
                                                          • Opcode ID: 4cdb050dc06f7917c6d172ebe8fb2e7cca83af0d26b62d6ac3a3c90f9d510447
                                                          • Instruction ID: a2672b45cb9fbf618d7c18b9ba919e0908ddd171aa6545aeabe2858f37659a8d
                                                          • Opcode Fuzzy Hash: 4cdb050dc06f7917c6d172ebe8fb2e7cca83af0d26b62d6ac3a3c90f9d510447
                                                          • Instruction Fuzzy Hash: 46B19D75A00209AFDB14DFA8DC89FAE7BB5FB48314F154219FA15AB290DB30A851CF51
                                                          APIs
                                                            • Part of subcall function 001B10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 001B1114
                                                            • Part of subcall function 001B10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,001B0B9B,?,?,?), ref: 001B1120
                                                            • Part of subcall function 001B10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,001B0B9B,?,?,?), ref: 001B112F
                                                            • Part of subcall function 001B10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,001B0B9B,?,?,?), ref: 001B1136
                                                            • Part of subcall function 001B10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 001B114D
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 001B0DF5
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 001B0E29
                                                          • GetLengthSid.ADVAPI32(?), ref: 001B0E40
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 001B0E7A
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 001B0E96
                                                          • GetLengthSid.ADVAPI32(?), ref: 001B0EAD
                                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 001B0EB5
                                                          • HeapAlloc.KERNEL32(00000000), ref: 001B0EBC
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 001B0EDD
                                                          • CopySid.ADVAPI32(00000000), ref: 001B0EE4
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 001B0F13
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 001B0F35
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 001B0F47
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001B0F6E
                                                          • HeapFree.KERNEL32(00000000), ref: 001B0F75
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001B0F7E
                                                          • HeapFree.KERNEL32(00000000), ref: 001B0F85
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001B0F8E
                                                          • HeapFree.KERNEL32(00000000), ref: 001B0F95
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 001B0FA1
                                                          • HeapFree.KERNEL32(00000000), ref: 001B0FA8
                                                            • Part of subcall function 001B1193: GetProcessHeap.KERNEL32(00000008,001B0BB1,?,00000000,?,001B0BB1,?), ref: 001B11A1
                                                            • Part of subcall function 001B1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,001B0BB1,?), ref: 001B11A8
                                                            • Part of subcall function 001B1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,001B0BB1,?), ref: 001B11B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                          • String ID:
                                                          • API String ID: 4175595110-0
                                                          • Opcode ID: 365165600e43cbaca138e706d2db661535369f410b0f9a8ca5d5c62b782e2fcf
                                                          • Instruction ID: e4dca2856a8dd8ec66b152bc9d0124a020c05f6b5a6599d5e7ad154cd698a19e
                                                          • Opcode Fuzzy Hash: 365165600e43cbaca138e706d2db661535369f410b0f9a8ca5d5c62b782e2fcf
                                                          • Instruction Fuzzy Hash: 13713E71A0020AEBDF219FA4DC45FEFBBB8BF09310F148159F919EA191D7719A45CBA0
                                                          APIs
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001DC4BD
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,001ECC08,00000000,?,00000000,?,?), ref: 001DC544
                                                          • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 001DC5A4
                                                          • _wcslen.LIBCMT ref: 001DC5F4
                                                          • _wcslen.LIBCMT ref: 001DC66F
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 001DC6B2
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 001DC7C1
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 001DC84D
                                                          • RegCloseKey.ADVAPI32(?), ref: 001DC881
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 001DC88E
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 001DC960
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                          • API String ID: 9721498-966354055
                                                          • Opcode ID: 1852dbfff8015573873daed53c43a23f5af79adc150683e465566d74672f2c27
                                                          • Instruction ID: d8912816042648fcee3af71ac8376a4ba1b1e875d11ed8f19c5a5d9af54deae1
                                                          • Opcode Fuzzy Hash: 1852dbfff8015573873daed53c43a23f5af79adc150683e465566d74672f2c27
                                                          • Instruction Fuzzy Hash: 6B125635604201DFCB14DF24D881A2AB7E5EF88725F04885DF89A9B3A2DB31ED45CB81
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 001E09C6
                                                          • _wcslen.LIBCMT ref: 001E0A01
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 001E0A54
                                                          • _wcslen.LIBCMT ref: 001E0A8A
                                                          • _wcslen.LIBCMT ref: 001E0B06
                                                          • _wcslen.LIBCMT ref: 001E0B81
                                                            • Part of subcall function 0016F9F2: _wcslen.LIBCMT ref: 0016F9FD
                                                            • Part of subcall function 001B2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001B2BFA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                          • API String ID: 1103490817-4258414348
                                                          • Opcode ID: 252e72f6885c459ff379819bee2d6aec2075036b8b5cc0b1313d4a0a2d875e10
                                                          • Instruction ID: 80427f7f087eb66a85ac83602308ddba293a2fa3b0ac98c233842aa4a15e79bb
                                                          • Opcode Fuzzy Hash: 252e72f6885c459ff379819bee2d6aec2075036b8b5cc0b1313d4a0a2d875e10
                                                          • Instruction Fuzzy Hash: E8E1CF35208781CFC715DF25C85086EB7E1BFA8318B15895DF8969B3A2D770ED89CB81
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                          • API String ID: 1256254125-909552448
                                                          • Opcode ID: 20b88b47279353510ec4cf1d1d31a46b78242ebb47bf285d58f9a4c05d1fd41c
                                                          • Instruction ID: d6245dd430dde039f165571733629b2fe9eb1e58e217e3a2b12c72540eed256d
                                                          • Opcode Fuzzy Hash: 20b88b47279353510ec4cf1d1d31a46b78242ebb47bf285d58f9a4c05d1fd41c
                                                          • Instruction Fuzzy Hash: 7A71E23261016B8BCB20DE6CCD515BB33A5ABB4794B150A2AF8669B384F731CD95C3E0
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 001E835A
                                                          • _wcslen.LIBCMT ref: 001E836E
                                                          • _wcslen.LIBCMT ref: 001E8391
                                                          • _wcslen.LIBCMT ref: 001E83B4
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 001E83F2
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,001E361A,?), ref: 001E844E
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 001E8487
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 001E84CA
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 001E8501
                                                          • FreeLibrary.KERNEL32(?), ref: 001E850D
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 001E851D
                                                          • DestroyIcon.USER32(?), ref: 001E852C
                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 001E8549
                                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 001E8555
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                          • String ID: .dll$.exe$.icl
                                                          • API String ID: 799131459-1154884017
                                                          • Opcode ID: e210cd6324be3034f49bcf58c00d27e57b901f29b9a9821d503ad88d9bf70393
                                                          • Instruction ID: fc55935db32132765dd03179264695d372ea9979399e8fb44e639ddb7af06e65
                                                          • Opcode Fuzzy Hash: e210cd6324be3034f49bcf58c00d27e57b901f29b9a9821d503ad88d9bf70393
                                                          • Instruction Fuzzy Hash: D961DD71500A55BBEB14DF65CC81BBE77A8FF18B11F104609F919EA0D1EF74A990CBA0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                          • API String ID: 0-1645009161
                                                          • Opcode ID: e7a80dc27dd89e100d62400993a15836ae85a28c54b28ec72d94f95b19b99acd
                                                          • Instruction ID: 7247a3f6008b533b1c2e1aaa10308fff320aa1767db4cc3ed6eb313b38e1e8a2
                                                          • Opcode Fuzzy Hash: e7a80dc27dd89e100d62400993a15836ae85a28c54b28ec72d94f95b19b99acd
                                                          • Instruction Fuzzy Hash: DC81F371640605EBDB25AF60EC47FAE37A9AF25301F144024FD18AF1D6EB70DA16C7A1
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?), ref: 001C3EF8
                                                          • _wcslen.LIBCMT ref: 001C3F03
                                                          • _wcslen.LIBCMT ref: 001C3F5A
                                                          • _wcslen.LIBCMT ref: 001C3F98
                                                          • GetDriveTypeW.KERNEL32(?), ref: 001C3FD6
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 001C401E
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 001C4059
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 001C4087
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                          • API String ID: 1839972693-4113822522
                                                          • Opcode ID: 2a02ad73e86a19edbf78d0f739cf14832760f2a9ee12e8c050f93c8ae8e6bd07
                                                          • Instruction ID: 38371ae4ce0eccdd8646e59eb6cb3bad0adf499414161b234ae0a18d525c59c7
                                                          • Opcode Fuzzy Hash: 2a02ad73e86a19edbf78d0f739cf14832760f2a9ee12e8c050f93c8ae8e6bd07
                                                          • Instruction Fuzzy Hash: 1571B0326042019FC310DF24C8919AEB7F4EFB4758F50892DF9A59B251EB30DD49CB92
                                                          APIs
                                                          • LoadIconW.USER32(00000063), ref: 001B5A2E
                                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 001B5A40
                                                          • SetWindowTextW.USER32(?,?), ref: 001B5A57
                                                          • GetDlgItem.USER32(?,000003EA), ref: 001B5A6C
                                                          • SetWindowTextW.USER32(00000000,?), ref: 001B5A72
                                                          • GetDlgItem.USER32(?,000003E9), ref: 001B5A82
                                                          • SetWindowTextW.USER32(00000000,?), ref: 001B5A88
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 001B5AA9
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 001B5AC3
                                                          • GetWindowRect.USER32(?,?), ref: 001B5ACC
                                                          • _wcslen.LIBCMT ref: 001B5B33
                                                          • SetWindowTextW.USER32(?,?), ref: 001B5B6F
                                                          • GetDesktopWindow.USER32 ref: 001B5B75
                                                          • GetWindowRect.USER32(00000000), ref: 001B5B7C
                                                          • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 001B5BD3
                                                          • GetClientRect.USER32(?,?), ref: 001B5BE0
                                                          • PostMessageW.USER32(?,00000005,00000000,?), ref: 001B5C05
                                                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 001B5C2F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                          • String ID:
                                                          • API String ID: 895679908-0
                                                          • Opcode ID: e4da5687edfecad64d0ec3c3a4fa2d26272cdff695b096afeb86de434ca3f5a2
                                                          • Instruction ID: f1ac7fb0f1c883ce79a91c4ca64db9b0c92fe5a110eaac1490b8a1067f55c896
                                                          • Opcode Fuzzy Hash: e4da5687edfecad64d0ec3c3a4fa2d26272cdff695b096afeb86de434ca3f5a2
                                                          • Instruction Fuzzy Hash: 4E716D31900B09AFDB20DFA9CE85BAEBBF6FF48704F104518E542A76A0D775E945CB50
                                                          APIs
                                                          • LoadCursorW.USER32(00000000,00007F89), ref: 001CFE27
                                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 001CFE32
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 001CFE3D
                                                          • LoadCursorW.USER32(00000000,00007F03), ref: 001CFE48
                                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 001CFE53
                                                          • LoadCursorW.USER32(00000000,00007F01), ref: 001CFE5E
                                                          • LoadCursorW.USER32(00000000,00007F81), ref: 001CFE69
                                                          • LoadCursorW.USER32(00000000,00007F88), ref: 001CFE74
                                                          • LoadCursorW.USER32(00000000,00007F80), ref: 001CFE7F
                                                          • LoadCursorW.USER32(00000000,00007F86), ref: 001CFE8A
                                                          • LoadCursorW.USER32(00000000,00007F83), ref: 001CFE95
                                                          • LoadCursorW.USER32(00000000,00007F85), ref: 001CFEA0
                                                          • LoadCursorW.USER32(00000000,00007F82), ref: 001CFEAB
                                                          • LoadCursorW.USER32(00000000,00007F84), ref: 001CFEB6
                                                          • LoadCursorW.USER32(00000000,00007F04), ref: 001CFEC1
                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 001CFECC
                                                          • GetCursorInfo.USER32(?), ref: 001CFEDC
                                                          • GetLastError.KERNEL32 ref: 001CFF1E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Cursor$Load$ErrorInfoLast
                                                          • String ID:
                                                          • API String ID: 3215588206-0
                                                          • Opcode ID: 921c7b0c0518151aaf58f34f0c5bc3a0020e68280784996f3f4e2696f0d4df44
                                                          • Instruction ID: 2bd156a8d462a121a90638d5bc7ce9e18600bba913d463d2b9fd130ee5969797
                                                          • Opcode Fuzzy Hash: 921c7b0c0518151aaf58f34f0c5bc3a0020e68280784996f3f4e2696f0d4df44
                                                          • Instruction Fuzzy Hash: 4C4152B0D04319AADB109FBA8C89D5EBFE9FF04754B50452EE11DEB281DB78E901CE91
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[!
                                                          • API String ID: 176396367-2891400992
                                                          • Opcode ID: c9babb239876d378d57653d0dd10fbcf10029a962191d244b7042387136036d1
                                                          • Instruction ID: 341570cc986afb8cc324ff6d4a9055ec64c6e8ee38ae2350151a07c70473d904
                                                          • Opcode Fuzzy Hash: c9babb239876d378d57653d0dd10fbcf10029a962191d244b7042387136036d1
                                                          • Instruction Fuzzy Hash: 5FE1F731A00526EBCB289F78C8416EEFBB4BF64714F558159E476E7240DB30AFA9C790
                                                          APIs
                                                          • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 001700C6
                                                            • Part of subcall function 001700ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0022070C,00000FA0,4EF0259B,?,?,?,?,001923B3,000000FF), ref: 0017011C
                                                            • Part of subcall function 001700ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,001923B3,000000FF), ref: 00170127
                                                            • Part of subcall function 001700ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,001923B3,000000FF), ref: 00170138
                                                            • Part of subcall function 001700ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0017014E
                                                            • Part of subcall function 001700ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0017015C
                                                            • Part of subcall function 001700ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0017016A
                                                            • Part of subcall function 001700ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00170195
                                                            • Part of subcall function 001700ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 001701A0
                                                          • ___scrt_fastfail.LIBCMT ref: 001700E7
                                                            • Part of subcall function 001700A3: __onexit.LIBCMT ref: 001700A9
                                                          Strings
                                                          • kernel32.dll, xrefs: 00170133
                                                          • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00170122
                                                          • SleepConditionVariableCS, xrefs: 00170154
                                                          • WakeAllConditionVariable, xrefs: 00170162
                                                          • InitializeConditionVariable, xrefs: 00170148
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                          • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                          • API String ID: 66158676-1714406822
                                                          • Opcode ID: 3bbcb1bf2e22a07ec908ea673c29008e07f2816c6265658d8e00a029e88e7184
                                                          • Instruction ID: e356922bb1980496ccd717467a1baf5552c58520123243afcaa1d9daacac54b2
                                                          • Opcode Fuzzy Hash: 3bbcb1bf2e22a07ec908ea673c29008e07f2816c6265658d8e00a029e88e7184
                                                          • Instruction Fuzzy Hash: 9A21F932A44750EBD7226BE4BC89B6E77F4EB0DB61F01813DFC0596691DBB09C418A90
                                                          APIs
                                                          • CharLowerBuffW.USER32(00000000,00000000,001ECC08), ref: 001C4527
                                                          • _wcslen.LIBCMT ref: 001C453B
                                                          • _wcslen.LIBCMT ref: 001C4599
                                                          • _wcslen.LIBCMT ref: 001C45F4
                                                          • _wcslen.LIBCMT ref: 001C463F
                                                          • _wcslen.LIBCMT ref: 001C46A7
                                                            • Part of subcall function 0016F9F2: _wcslen.LIBCMT ref: 0016F9FD
                                                          • GetDriveTypeW.KERNEL32(?,00216BF0,00000061), ref: 001C4743
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharDriveLowerType
                                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                          • API String ID: 2055661098-1000479233
                                                          • Opcode ID: 786217f83316d2d2488c395c19c9af77e7c26d07260b9c40ffb14c9e905a8aca
                                                          • Instruction ID: aed63cb13965299cfd2ff0b53bc85122b9afc9b19351049dc1e64fd06d21307e
                                                          • Opcode Fuzzy Hash: 786217f83316d2d2488c395c19c9af77e7c26d07260b9c40ffb14c9e905a8aca
                                                          • Instruction Fuzzy Hash: 58B1EE3160C3129FC724DF28C8A0E6EB7E5AFB5724F50491DF4A6C7291E730D989CA92
                                                          APIs
                                                            • Part of subcall function 00169BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00169BB2
                                                          • DragQueryPoint.SHELL32(?,?), ref: 001E9147
                                                            • Part of subcall function 001E7674: ClientToScreen.USER32(?,?), ref: 001E769A
                                                            • Part of subcall function 001E7674: GetWindowRect.USER32(?,?), ref: 001E7710
                                                            • Part of subcall function 001E7674: PtInRect.USER32(?,?,001E8B89), ref: 001E7720
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 001E91B0
                                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 001E91BB
                                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 001E91DE
                                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 001E9225
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 001E923E
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 001E9255
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 001E9277
                                                          • DragFinish.SHELL32(?), ref: 001E927E
                                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 001E9371
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#"
                                                          • API String ID: 221274066-2770955705
                                                          • Opcode ID: a842275943251ea8e1eae865721eac10eb7c78a8ca96714ad7a0d06066b38838
                                                          • Instruction ID: 66afaa6a605685e56af0162986c42b66183c84e9430487698f711a4cc01eea3c
                                                          • Opcode Fuzzy Hash: a842275943251ea8e1eae865721eac10eb7c78a8ca96714ad7a0d06066b38838
                                                          • Instruction Fuzzy Hash: BA618A71108341AFC701DFA4DC85DAFBBE8EF99750F40091EF9A1961A1DB709A4ACB92
                                                          APIs
                                                          • GetMenuItemCount.USER32(00221990), ref: 00192F8D
                                                          • GetMenuItemCount.USER32(00221990), ref: 0019303D
                                                          • GetCursorPos.USER32(?), ref: 00193081
                                                          • SetForegroundWindow.USER32(00000000), ref: 0019308A
                                                          • TrackPopupMenuEx.USER32(00221990,00000000,?,00000000,00000000,00000000), ref: 0019309D
                                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 001930A9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                          • String ID: 0
                                                          • API String ID: 36266755-4108050209
                                                          • Opcode ID: 85a7c4504ba4286bb48374c7a11d557fe90473f3c288edde4ec3cf77dc7a1434
                                                          • Instruction ID: f82545977a383ce4f6b3b62799d1f15469a782a4ed6e4240c5ea91909b126c7f
                                                          • Opcode Fuzzy Hash: 85a7c4504ba4286bb48374c7a11d557fe90473f3c288edde4ec3cf77dc7a1434
                                                          • Instruction Fuzzy Hash: 65710470644205BEEF258F64CC89FAABF64FF05364F244216F939AA1E0C7B1A954DB90
                                                          APIs
                                                          • DestroyWindow.USER32(00000000,?), ref: 001E6DEB
                                                            • Part of subcall function 00156B57: _wcslen.LIBCMT ref: 00156B6A
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 001E6E5F
                                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 001E6E81
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 001E6E94
                                                          • DestroyWindow.USER32(?), ref: 001E6EB5
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00150000,00000000), ref: 001E6EE4
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 001E6EFD
                                                          • GetDesktopWindow.USER32 ref: 001E6F16
                                                          • GetWindowRect.USER32(00000000), ref: 001E6F1D
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 001E6F35
                                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 001E6F4D
                                                            • Part of subcall function 00169944: GetWindowLongW.USER32(?,000000EB), ref: 00169952
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                          • String ID: 0$tooltips_class32
                                                          • API String ID: 2429346358-3619404913
                                                          • Opcode ID: c1d002fefd6d54685eceda1c8ab1198487b4ae895c87943848e72e03d428e9cb
                                                          • Instruction ID: eb917520e619384ba7993f3df8a2800c38f0cdcf99eaf7480dad1bf9fb1fb6d5
                                                          • Opcode Fuzzy Hash: c1d002fefd6d54685eceda1c8ab1198487b4ae895c87943848e72e03d428e9cb
                                                          • Instruction Fuzzy Hash: 2B718870104684AFDB20CF59DC98EAABBE9FBA9340F84041DF999872A1C770AD46CB51
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 001CC4B0
                                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 001CC4C3
                                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 001CC4D7
                                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 001CC4F0
                                                          • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 001CC533
                                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 001CC549
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 001CC554
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 001CC584
                                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 001CC5DC
                                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 001CC5F0
                                                          • InternetCloseHandle.WININET(00000000), ref: 001CC5FB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                          • String ID:
                                                          • API String ID: 3800310941-3916222277
                                                          • Opcode ID: d0f0f76b83423dd72d93ddf2fa1c3bedb57acacc4740357d7e79515415217e37
                                                          • Instruction ID: 57bc27fd7e66794e956fa27ecd59b972446767756cdc8f9238d22c7ca00916d9
                                                          • Opcode Fuzzy Hash: d0f0f76b83423dd72d93ddf2fa1c3bedb57acacc4740357d7e79515415217e37
                                                          • Instruction Fuzzy Hash: 1E515CB1600245BFDB218FA4CD88FAB7BBCFB28744F00841DF94996650DB30ED459BA1
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 001E8592
                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 001E85A2
                                                          • GlobalAlloc.KERNEL32(00000002,00000000), ref: 001E85AD
                                                          • CloseHandle.KERNEL32(00000000), ref: 001E85BA
                                                          • GlobalLock.KERNEL32(00000000), ref: 001E85C8
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 001E85D7
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 001E85E0
                                                          • CloseHandle.KERNEL32(00000000), ref: 001E85E7
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 001E85F8
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,001EFC38,?), ref: 001E8611
                                                          • GlobalFree.KERNEL32(00000000), ref: 001E8621
                                                          • GetObjectW.GDI32(?,00000018,000000FF), ref: 001E8641
                                                          • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 001E8671
                                                          • DeleteObject.GDI32(00000000), ref: 001E8699
                                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 001E86AF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                          • String ID:
                                                          • API String ID: 3840717409-0
                                                          • Opcode ID: 6e4242230b918421bf117b330e8e8bdfea36f6de314ddba5b61a4f423f712ffc
                                                          • Instruction ID: 531392b2a654cf94237b56636f7f2ef4b03352c59a4201793c89ade2b9574e06
                                                          • Opcode Fuzzy Hash: 6e4242230b918421bf117b330e8e8bdfea36f6de314ddba5b61a4f423f712ffc
                                                          • Instruction Fuzzy Hash: 18411975600285AFDB11DFA5CC88EAEBBB8FF89715F104158F919EB260DB309942DB60
                                                          APIs
                                                          • VariantInit.OLEAUT32(00000000), ref: 001C1502
                                                          • VariantCopy.OLEAUT32(?,?), ref: 001C150B
                                                          • VariantClear.OLEAUT32(?), ref: 001C1517
                                                          • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 001C15FB
                                                          • VarR8FromDec.OLEAUT32(?,?), ref: 001C1657
                                                          • VariantInit.OLEAUT32(?), ref: 001C1708
                                                          • SysFreeString.OLEAUT32(?), ref: 001C178C
                                                          • VariantClear.OLEAUT32(?), ref: 001C17D8
                                                          • VariantClear.OLEAUT32(?), ref: 001C17E7
                                                          • VariantInit.OLEAUT32(00000000), ref: 001C1823
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                          • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                          • API String ID: 1234038744-3931177956
                                                          • Opcode ID: 6edbe6de115b5b106095eba924dcab14363a2173bc2b7253061c9817abcc79ca
                                                          • Instruction ID: b0af2e6ba45a7b19a998427d4a83240d02c3140056abde2e82de3e0814636c8b
                                                          • Opcode Fuzzy Hash: 6edbe6de115b5b106095eba924dcab14363a2173bc2b7253061c9817abcc79ca
                                                          • Instruction Fuzzy Hash: F1D12232A40210EBCB049F64E885F7DB7B1BF67B00F51809EE806AB182DB30EC55DB91
                                                          APIs
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                            • Part of subcall function 001DC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,001DB6AE,?,?), ref: 001DC9B5
                                                            • Part of subcall function 001DC998: _wcslen.LIBCMT ref: 001DC9F1
                                                            • Part of subcall function 001DC998: _wcslen.LIBCMT ref: 001DCA68
                                                            • Part of subcall function 001DC998: _wcslen.LIBCMT ref: 001DCA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001DB6F4
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 001DB772
                                                          • RegDeleteValueW.ADVAPI32(?,?), ref: 001DB80A
                                                          • RegCloseKey.ADVAPI32(?), ref: 001DB87E
                                                          • RegCloseKey.ADVAPI32(?), ref: 001DB89C
                                                          • LoadLibraryA.KERNEL32(advapi32.dll), ref: 001DB8F2
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 001DB904
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 001DB922
                                                          • FreeLibrary.KERNEL32(00000000), ref: 001DB983
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 001DB994
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 146587525-4033151799
                                                          • Opcode ID: 0f4a728cbc8a2ee426d097ce7c55b1c0d4b2bdd07961685afdbea9c89a2d4df1
                                                          • Instruction ID: 41cdf8b803d9a026a25f816a7d21db6a6efdbdd8aff31dec16152f68b0cbb75a
                                                          • Opcode Fuzzy Hash: 0f4a728cbc8a2ee426d097ce7c55b1c0d4b2bdd07961685afdbea9c89a2d4df1
                                                          • Instruction Fuzzy Hash: 67C17A34208241EFD714DF24C8D5B2ABBE1BF84318F55855DF8AA4B3A2CB75E846CB91
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 001D25D8
                                                          • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 001D25E8
                                                          • CreateCompatibleDC.GDI32(?), ref: 001D25F4
                                                          • SelectObject.GDI32(00000000,?), ref: 001D2601
                                                          • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 001D266D
                                                          • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 001D26AC
                                                          • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 001D26D0
                                                          • SelectObject.GDI32(?,?), ref: 001D26D8
                                                          • DeleteObject.GDI32(?), ref: 001D26E1
                                                          • DeleteDC.GDI32(?), ref: 001D26E8
                                                          • ReleaseDC.USER32(00000000,?), ref: 001D26F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                          • String ID: (
                                                          • API String ID: 2598888154-3887548279
                                                          • Opcode ID: 8f40086addcdb11f39bd9d65203257d84e9fa5fb4666297c23038875ca98d804
                                                          • Instruction ID: 32366ef68d2cb7e2b455021d5073a523e199db7b50ffaf7f8f4b15dac6d7b865
                                                          • Opcode Fuzzy Hash: 8f40086addcdb11f39bd9d65203257d84e9fa5fb4666297c23038875ca98d804
                                                          • Instruction Fuzzy Hash: 8F61C1B5D00219EFCB14CFA8DC84AAEBBB6FF58310F20852AE955A7350D774A951CF90
                                                          APIs
                                                          • ___free_lconv_mon.LIBCMT ref: 0018DAA1
                                                            • Part of subcall function 0018D63C: _free.LIBCMT ref: 0018D659
                                                            • Part of subcall function 0018D63C: _free.LIBCMT ref: 0018D66B
                                                            • Part of subcall function 0018D63C: _free.LIBCMT ref: 0018D67D
                                                            • Part of subcall function 0018D63C: _free.LIBCMT ref: 0018D68F
                                                            • Part of subcall function 0018D63C: _free.LIBCMT ref: 0018D6A1
                                                            • Part of subcall function 0018D63C: _free.LIBCMT ref: 0018D6B3
                                                            • Part of subcall function 0018D63C: _free.LIBCMT ref: 0018D6C5
                                                            • Part of subcall function 0018D63C: _free.LIBCMT ref: 0018D6D7
                                                            • Part of subcall function 0018D63C: _free.LIBCMT ref: 0018D6E9
                                                            • Part of subcall function 0018D63C: _free.LIBCMT ref: 0018D6FB
                                                            • Part of subcall function 0018D63C: _free.LIBCMT ref: 0018D70D
                                                            • Part of subcall function 0018D63C: _free.LIBCMT ref: 0018D71F
                                                            • Part of subcall function 0018D63C: _free.LIBCMT ref: 0018D731
                                                          • _free.LIBCMT ref: 0018DA96
                                                            • Part of subcall function 001829C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0018D7D1,00000000,00000000,00000000,00000000,?,0018D7F8,00000000,00000007,00000000,?,0018DBF5,00000000), ref: 001829DE
                                                            • Part of subcall function 001829C8: GetLastError.KERNEL32(00000000,?,0018D7D1,00000000,00000000,00000000,00000000,?,0018D7F8,00000000,00000007,00000000,?,0018DBF5,00000000,00000000), ref: 001829F0
                                                          • _free.LIBCMT ref: 0018DAB8
                                                          • _free.LIBCMT ref: 0018DACD
                                                          • _free.LIBCMT ref: 0018DAD8
                                                          • _free.LIBCMT ref: 0018DAFA
                                                          • _free.LIBCMT ref: 0018DB0D
                                                          • _free.LIBCMT ref: 0018DB1B
                                                          • _free.LIBCMT ref: 0018DB26
                                                          • _free.LIBCMT ref: 0018DB5E
                                                          • _free.LIBCMT ref: 0018DB65
                                                          • _free.LIBCMT ref: 0018DB82
                                                          • _free.LIBCMT ref: 0018DB9A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                          • String ID:
                                                          • API String ID: 161543041-0
                                                          • Opcode ID: cbc8953d7d4b8dcb9b4ee82a4b2ca2b9f702201be4733a06482567f12a8bd0b8
                                                          • Instruction ID: 4a91c1c0325c8934cdcf5674f1353731a7c9c8fa52d13f36c735cf8abada8a20
                                                          • Opcode Fuzzy Hash: cbc8953d7d4b8dcb9b4ee82a4b2ca2b9f702201be4733a06482567f12a8bd0b8
                                                          • Instruction Fuzzy Hash: F4313731A443059FEB26BA39F845B5AB7E9FF21324F264429E449D7191DF35AE808F20
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 001B369C
                                                          • _wcslen.LIBCMT ref: 001B36A7
                                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 001B3797
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 001B380C
                                                          • GetDlgCtrlID.USER32(?), ref: 001B385D
                                                          • GetWindowRect.USER32(?,?), ref: 001B3882
                                                          • GetParent.USER32(?), ref: 001B38A0
                                                          • ScreenToClient.USER32(00000000), ref: 001B38A7
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 001B3921
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 001B395D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                          • String ID: %s%u
                                                          • API String ID: 4010501982-679674701
                                                          • Opcode ID: c787450e7e13e4d5d7a767ccadc07dc49ecf575722502a244da1af47334fcc6c
                                                          • Instruction ID: 562c0c7536aecb1dcd698c691e8e14177ee4be895276a20283c89927e1c7e8fe
                                                          • Opcode Fuzzy Hash: c787450e7e13e4d5d7a767ccadc07dc49ecf575722502a244da1af47334fcc6c
                                                          • Instruction Fuzzy Hash: 2891D571204706EFD718DF64C885BEAF7A9FF44304F008619F9A9C6190DB30EA66CB91
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 001B4994
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 001B49DA
                                                          • _wcslen.LIBCMT ref: 001B49EB
                                                          • CharUpperBuffW.USER32(?,00000000), ref: 001B49F7
                                                          • _wcsstr.LIBVCRUNTIME ref: 001B4A2C
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 001B4A64
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 001B4A9D
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 001B4AE6
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 001B4B20
                                                          • GetWindowRect.USER32(?,?), ref: 001B4B8B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                          • String ID: ThumbnailClass
                                                          • API String ID: 1311036022-1241985126
                                                          • Opcode ID: d91afb4ae12f5918d7dc65362296f35fddf88aee4794562557d6aefcb9e458de
                                                          • Instruction ID: cc9497b8ce8579cdc645bca5a38b5642e3ee7f90f4c532047cbef99853791775
                                                          • Opcode Fuzzy Hash: d91afb4ae12f5918d7dc65362296f35fddf88aee4794562557d6aefcb9e458de
                                                          • Instruction Fuzzy Hash: E691BE710042059FDB04DF14C981BEA7BE9FF98714F048469FE869A197DB30ED46CBA1
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(00221990,000000FF,00000000,00000030), ref: 001BBFAC
                                                          • SetMenuItemInfoW.USER32(00221990,00000004,00000000,00000030), ref: 001BBFE1
                                                          • Sleep.KERNEL32(000001F4), ref: 001BBFF3
                                                          • GetMenuItemCount.USER32(?), ref: 001BC039
                                                          • GetMenuItemID.USER32(?,00000000), ref: 001BC056
                                                          • GetMenuItemID.USER32(?,-00000001), ref: 001BC082
                                                          • GetMenuItemID.USER32(?,?), ref: 001BC0C9
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 001BC10F
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 001BC124
                                                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 001BC145
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                          • String ID: 0
                                                          • API String ID: 1460738036-4108050209
                                                          • Opcode ID: c3424c8a3b19b608ac9559f1d44dbcc3db2d9e9c0a06c6cb6f4152468a927256
                                                          • Instruction ID: 8d3c596c33066416010e7c6d3c6a2cd3b915fc307e6e7413dd2685db03a8245d
                                                          • Opcode Fuzzy Hash: c3424c8a3b19b608ac9559f1d44dbcc3db2d9e9c0a06c6cb6f4152468a927256
                                                          • Instruction Fuzzy Hash: C1618DB0A0024AEFDF15DFA8DC88AFEBBA8EF15344F144059F811A7291C771AD45CBA0
                                                          APIs
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 001DCC64
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 001DCC8D
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 001DCD48
                                                            • Part of subcall function 001DCC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 001DCCAA
                                                            • Part of subcall function 001DCC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 001DCCBD
                                                            • Part of subcall function 001DCC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 001DCCCF
                                                            • Part of subcall function 001DCC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 001DCD05
                                                            • Part of subcall function 001DCC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 001DCD28
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 001DCCF3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 2734957052-4033151799
                                                          • Opcode ID: 774cda740f2d10a310b63a88f5e3ba1a871d8827ab1530984c51ba8b3999df5b
                                                          • Instruction ID: dd7cd1413a60e28c124265ad56957fa8bff1d218fe38e6e5c8bc205270a94f93
                                                          • Opcode Fuzzy Hash: 774cda740f2d10a310b63a88f5e3ba1a871d8827ab1530984c51ba8b3999df5b
                                                          • Instruction Fuzzy Hash: BD316F7590112ABBDB208B94DC88EFFBBBDEF55750F000566F905E6240DB349A86DAE0
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 001C3D40
                                                          • _wcslen.LIBCMT ref: 001C3D6D
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 001C3D9D
                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 001C3DBE
                                                          • RemoveDirectoryW.KERNEL32(?), ref: 001C3DCE
                                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 001C3E55
                                                          • CloseHandle.KERNEL32(00000000), ref: 001C3E60
                                                          • CloseHandle.KERNEL32(00000000), ref: 001C3E6B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                          • String ID: :$\$\??\%s
                                                          • API String ID: 1149970189-3457252023
                                                          • Opcode ID: 1b95dbfcdd9583b01f9b52e27aae575f69693dfd39ca9e02b1aee5603b0ff9d8
                                                          • Instruction ID: eb6072a984074663496d2be41e9e7db1a09e8451816bd3f6bf0567997897a170
                                                          • Opcode Fuzzy Hash: 1b95dbfcdd9583b01f9b52e27aae575f69693dfd39ca9e02b1aee5603b0ff9d8
                                                          • Instruction Fuzzy Hash: BB31A37190024AABDB209BE0DC89FEF37BDEF99700F5081A9F619D6050EB70D7858B64
                                                          APIs
                                                          • timeGetTime.WINMM ref: 001BE6B4
                                                            • Part of subcall function 0016E551: timeGetTime.WINMM(?,?,001BE6D4), ref: 0016E555
                                                          • Sleep.KERNEL32(0000000A), ref: 001BE6E1
                                                          • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 001BE705
                                                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 001BE727
                                                          • SetActiveWindow.USER32 ref: 001BE746
                                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 001BE754
                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 001BE773
                                                          • Sleep.KERNEL32(000000FA), ref: 001BE77E
                                                          • IsWindow.USER32 ref: 001BE78A
                                                          • EndDialog.USER32(00000000), ref: 001BE79B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                          • String ID: BUTTON
                                                          • API String ID: 1194449130-3405671355
                                                          • Opcode ID: 8d406aad15bd029285a84607ee4b49d85aa534fac1cde1823edbb2ea3edaf226
                                                          • Instruction ID: a7fe1fcf2dd765c1a3cf34a865e1e397d956cd75ab2c05ca43d3e281d7e7ad1b
                                                          • Opcode Fuzzy Hash: 8d406aad15bd029285a84607ee4b49d85aa534fac1cde1823edbb2ea3edaf226
                                                          • Instruction Fuzzy Hash: AE216571600244FFEB205FE0FCCDEBA3BADEB65348F102424F815956B1DB729C568A94
                                                          APIs
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 001BEA5D
                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 001BEA73
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 001BEA84
                                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 001BEA96
                                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 001BEAA7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: SendString$_wcslen
                                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                          • API String ID: 2420728520-1007645807
                                                          • Opcode ID: 6466f490cdd02d90104a296621b63d52dbb4a838e671d42eae625ca75735855c
                                                          • Instruction ID: 02e5f37ec66adec7f56aed0b63ca405075908daf2cbc269bf4993a754cb72b87
                                                          • Opcode Fuzzy Hash: 6466f490cdd02d90104a296621b63d52dbb4a838e671d42eae625ca75735855c
                                                          • Instruction Fuzzy Hash: 7E115431A50259BAD710A7A1DC4ADFF6ABCEBE2B44F400429B821A70D1DF701999C5B0
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 001BA012
                                                          • SetKeyboardState.USER32(?), ref: 001BA07D
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 001BA09D
                                                          • GetKeyState.USER32(000000A0), ref: 001BA0B4
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 001BA0E3
                                                          • GetKeyState.USER32(000000A1), ref: 001BA0F4
                                                          • GetAsyncKeyState.USER32(00000011), ref: 001BA120
                                                          • GetKeyState.USER32(00000011), ref: 001BA12E
                                                          • GetAsyncKeyState.USER32(00000012), ref: 001BA157
                                                          • GetKeyState.USER32(00000012), ref: 001BA165
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 001BA18E
                                                          • GetKeyState.USER32(0000005B), ref: 001BA19C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 312193e72dbf1481e33d9a46dcadce4f8c118d8408948b0e010694612e6a4849
                                                          • Instruction ID: 3b7d99fe83ecab957caa7340aeaac980ca43b1ecc65fb2c3f6d7c45bd18553a2
                                                          • Opcode Fuzzy Hash: 312193e72dbf1481e33d9a46dcadce4f8c118d8408948b0e010694612e6a4849
                                                          • Instruction Fuzzy Hash: FE51EA2090478829FB35EBA488517EEBFF49F12380F48459DD5C25B5C2DB54AA8CC762
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000001), ref: 001B5CE2
                                                          • GetWindowRect.USER32(00000000,?), ref: 001B5CFB
                                                          • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 001B5D59
                                                          • GetDlgItem.USER32(?,00000002), ref: 001B5D69
                                                          • GetWindowRect.USER32(00000000,?), ref: 001B5D7B
                                                          • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 001B5DCF
                                                          • GetDlgItem.USER32(?,000003E9), ref: 001B5DDD
                                                          • GetWindowRect.USER32(00000000,?), ref: 001B5DEF
                                                          • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 001B5E31
                                                          • GetDlgItem.USER32(?,000003EA), ref: 001B5E44
                                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 001B5E5A
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 001B5E67
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMoveRect$Invalidate
                                                          • String ID:
                                                          • API String ID: 3096461208-0
                                                          • Opcode ID: 3eab44d0210ce33abb52f4df6f2e7d4dffaa33dc92893f4b68bf0a59ff076a43
                                                          • Instruction ID: 1c8e8f26108f1c1af2a3d94489d0627a954006183a796c8e4340b5ea095757eb
                                                          • Opcode Fuzzy Hash: 3eab44d0210ce33abb52f4df6f2e7d4dffaa33dc92893f4b68bf0a59ff076a43
                                                          • Instruction Fuzzy Hash: 4C512F70A00605AFDF18CFA8CD89AAEBBB6FB48300F148229F915E6690D7709E41CB50
                                                          APIs
                                                            • Part of subcall function 00168F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00168BE8,?,00000000,?,?,?,?,00168BBA,00000000,?), ref: 00168FC5
                                                          • DestroyWindow.USER32(?), ref: 00168C81
                                                          • KillTimer.USER32(00000000,?,?,?,?,00168BBA,00000000,?), ref: 00168D1B
                                                          • DestroyAcceleratorTable.USER32(00000000), ref: 001A6973
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00168BBA,00000000,?), ref: 001A69A1
                                                          • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00168BBA,00000000,?), ref: 001A69B8
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00168BBA,00000000), ref: 001A69D4
                                                          • DeleteObject.GDI32(00000000), ref: 001A69E6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                          • String ID:
                                                          • API String ID: 641708696-0
                                                          • Opcode ID: 1ec6eda0ddf23a7c79e96976abe0e8ef65044d5ce10e54a59839f2161630bf14
                                                          • Instruction ID: 2484baa8373aab9d9dfb2bdb719269d21726a97cca42459797a11b5def6ff1c9
                                                          • Opcode Fuzzy Hash: 1ec6eda0ddf23a7c79e96976abe0e8ef65044d5ce10e54a59839f2161630bf14
                                                          • Instruction Fuzzy Hash: 3161AA35502700EFCB359F64DD98B6AB7F1FB65316F145618E0429B960CB31A8E2CBA1
                                                          APIs
                                                            • Part of subcall function 00169944: GetWindowLongW.USER32(?,000000EB), ref: 00169952
                                                          • GetSysColor.USER32(0000000F), ref: 00169862
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ColorLongWindow
                                                          • String ID:
                                                          • API String ID: 259745315-0
                                                          • Opcode ID: 1cff851c32d916beb631d83b3fc2ba3dc9246a1ca9c3076d36517eb0d2d4ddf5
                                                          • Instruction ID: 1217693e04c5ee152832095e56ca4c860b89f30e4fe8b459753f5f3ee5dab72e
                                                          • Opcode Fuzzy Hash: 1cff851c32d916beb631d83b3fc2ba3dc9246a1ca9c3076d36517eb0d2d4ddf5
                                                          • Instruction Fuzzy Hash: 23419E31504684EFDB205F789C88BBA3BADAB47330F144619F9A28B1E1D7319D92DB50
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,0019F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 001B9717
                                                          • LoadStringW.USER32(00000000,?,0019F7F8,00000001), ref: 001B9720
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                          • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,0019F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 001B9742
                                                          • LoadStringW.USER32(00000000,?,0019F7F8,00000001), ref: 001B9745
                                                          • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 001B9866
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message_wcslen
                                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                          • API String ID: 747408836-2268648507
                                                          • Opcode ID: 203c470dd0b5dadda985d3462125ac13f861cc82cfcbfbffc6065d69a0495776
                                                          • Instruction ID: e1f1c025bb7d0780bb62b89cdd62c2d3f49248572ed3d7e59db53190ad649068
                                                          • Opcode Fuzzy Hash: 203c470dd0b5dadda985d3462125ac13f861cc82cfcbfbffc6065d69a0495776
                                                          • Instruction Fuzzy Hash: ED413C7280021DEACF14EBE0DD86DEE7779AF25341F500065FA157A092EB356F49CBA1
                                                          APIs
                                                            • Part of subcall function 00156B57: _wcslen.LIBCMT ref: 00156B6A
                                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 001B07A2
                                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 001B07BE
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 001B07DA
                                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 001B0804
                                                          • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 001B082C
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 001B0837
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 001B083C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                          • API String ID: 323675364-22481851
                                                          • Opcode ID: ce4973bae295c3564bee1d718aa577c969757c4d9d284924b85acdc7af21c940
                                                          • Instruction ID: 00c5535d042c9921350b5755f4c8305ec752e7450b33a897d962b13103482d21
                                                          • Opcode Fuzzy Hash: ce4973bae295c3564bee1d718aa577c969757c4d9d284924b85acdc7af21c940
                                                          • Instruction Fuzzy Hash: 57410772C1022DEBCF15EBA4DC958EEB7B8BF58350B444169F911AB161EB309E48CB90
                                                          APIs
                                                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 001E403B
                                                          • CreateCompatibleDC.GDI32(00000000), ref: 001E4042
                                                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 001E4055
                                                          • SelectObject.GDI32(00000000,00000000), ref: 001E405D
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 001E4068
                                                          • DeleteDC.GDI32(00000000), ref: 001E4072
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 001E407C
                                                          • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 001E4092
                                                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 001E409E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                          • String ID: static
                                                          • API String ID: 2559357485-2160076837
                                                          • Opcode ID: 2361a604c81841ca1e0cb2f8441f5f3b87d5b32e58971599a190db17e2f92288
                                                          • Instruction ID: 56517d1107cb38d3439faeb478bc51d1dae22c83fd65a110e1a820154b91b30a
                                                          • Opcode Fuzzy Hash: 2361a604c81841ca1e0cb2f8441f5f3b87d5b32e58971599a190db17e2f92288
                                                          • Instruction Fuzzy Hash: 42317C32500695ABDF219FA5DC49FDE3B69FF0D320F010220FA28A61A0C775D851DB90
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 001D3C5C
                                                          • CoInitialize.OLE32(00000000), ref: 001D3C8A
                                                          • CoUninitialize.OLE32 ref: 001D3C94
                                                          • _wcslen.LIBCMT ref: 001D3D2D
                                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 001D3DB1
                                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 001D3ED5
                                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 001D3F0E
                                                          • CoGetObject.OLE32(?,00000000,001EFB98,?), ref: 001D3F2D
                                                          • SetErrorMode.KERNEL32(00000000), ref: 001D3F40
                                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 001D3FC4
                                                          • VariantClear.OLEAUT32(?), ref: 001D3FD8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                          • String ID:
                                                          • API String ID: 429561992-0
                                                          • Opcode ID: 55f4faa9a142e70f32f42ebb0e0f52a895ffb4ea349b9a57e24e70a7653eae97
                                                          • Instruction ID: b3c89a55e26e99e775d534a3ae951f3c15edf3a68ddaa2239f9453e028731bee
                                                          • Opcode Fuzzy Hash: 55f4faa9a142e70f32f42ebb0e0f52a895ffb4ea349b9a57e24e70a7653eae97
                                                          • Instruction Fuzzy Hash: 08C133716082059FD700DF68C88496BB7E9FF89748F14491EF99A9B250D730EE46CB92
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 001C7AF3
                                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 001C7B8F
                                                          • SHGetDesktopFolder.SHELL32(?), ref: 001C7BA3
                                                          • CoCreateInstance.OLE32(001EFD08,00000000,00000001,00216E6C,?), ref: 001C7BEF
                                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 001C7C74
                                                          • CoTaskMemFree.OLE32(?,?), ref: 001C7CCC
                                                          • SHBrowseForFolderW.SHELL32(?), ref: 001C7D57
                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 001C7D7A
                                                          • CoTaskMemFree.OLE32(00000000), ref: 001C7D81
                                                          • CoTaskMemFree.OLE32(00000000), ref: 001C7DD6
                                                          • CoUninitialize.OLE32 ref: 001C7DDC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                          • String ID:
                                                          • API String ID: 2762341140-0
                                                          • Opcode ID: 0230e3a5d48034fca18eb341df77bf2917072143300227ae0d2c81229419d7f4
                                                          • Instruction ID: 00f931a8079ca45e1618bee603a9d069ef4387307a83f7f701c2944ccce73a14
                                                          • Opcode Fuzzy Hash: 0230e3a5d48034fca18eb341df77bf2917072143300227ae0d2c81229419d7f4
                                                          • Instruction Fuzzy Hash: 2BC10975A04109EFCB14DFA4C884EAEBBF9FF58304B148499E81A9B661D770EE45CF90
                                                          APIs
                                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 001E5504
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 001E5515
                                                          • CharNextW.USER32(00000158), ref: 001E5544
                                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 001E5585
                                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 001E559B
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 001E55AC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CharNext
                                                          • String ID:
                                                          • API String ID: 1350042424-0
                                                          • Opcode ID: d8d359b3c944f9d770401aaac1613ac68531bd924f783580325ee42b7905436c
                                                          • Instruction ID: 32101e79f093324e8bbafb7bcab77169bfba30422f68549bffd7ee1ed6d92dd6
                                                          • Opcode Fuzzy Hash: d8d359b3c944f9d770401aaac1613ac68531bd924f783580325ee42b7905436c
                                                          • Instruction Fuzzy Hash: D1619034900A89EFDF108F96CC84DFE7BBAEF09728F144145F925AB291D7748A81DB61
                                                          APIs
                                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 001AFAAF
                                                          • SafeArrayAllocData.OLEAUT32(?), ref: 001AFB08
                                                          • VariantInit.OLEAUT32(?), ref: 001AFB1A
                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 001AFB3A
                                                          • VariantCopy.OLEAUT32(?,?), ref: 001AFB8D
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 001AFBA1
                                                          • VariantClear.OLEAUT32(?), ref: 001AFBB6
                                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 001AFBC3
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 001AFBCC
                                                          • VariantClear.OLEAUT32(?), ref: 001AFBDE
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 001AFBE9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                          • String ID:
                                                          • API String ID: 2706829360-0
                                                          • Opcode ID: 99fd3ee76717eb4a2f2eb8879ddc951686047fa752d5c48f2b3f37f4b27c3b3d
                                                          • Instruction ID: 4afe7de2c2263cb75fbb847ad64e3d4d71254cd5f565be7edb3790a241e0ad45
                                                          • Opcode Fuzzy Hash: 99fd3ee76717eb4a2f2eb8879ddc951686047fa752d5c48f2b3f37f4b27c3b3d
                                                          • Instruction Fuzzy Hash: D5414175A00219DFCB04DFA8DC94DEEBBB9FF59344F008069F955AB661C730A946CBA0
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 001B9CA1
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 001B9D22
                                                          • GetKeyState.USER32(000000A0), ref: 001B9D3D
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 001B9D57
                                                          • GetKeyState.USER32(000000A1), ref: 001B9D6C
                                                          • GetAsyncKeyState.USER32(00000011), ref: 001B9D84
                                                          • GetKeyState.USER32(00000011), ref: 001B9D96
                                                          • GetAsyncKeyState.USER32(00000012), ref: 001B9DAE
                                                          • GetKeyState.USER32(00000012), ref: 001B9DC0
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 001B9DD8
                                                          • GetKeyState.USER32(0000005B), ref: 001B9DEA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 91ea4c7d8fdc298655e952c339eae9cb3fcea6364138f5d996f8e2fb97abf660
                                                          • Instruction ID: a0037fca92a5cdf4cf5dc20a4c4ba3f63520da8c8e2f8bcc027352eb09982a7d
                                                          • Opcode Fuzzy Hash: 91ea4c7d8fdc298655e952c339eae9cb3fcea6364138f5d996f8e2fb97abf660
                                                          • Instruction Fuzzy Hash: 4741F8346047CA6DFF3197A1C8443F5BEB06F15344F44805ADBC65A6C2DBA4A9CACBA2
                                                          APIs
                                                          • WSAStartup.WSOCK32(00000101,?), ref: 001D05BC
                                                          • inet_addr.WSOCK32(?), ref: 001D061C
                                                          • gethostbyname.WSOCK32(?), ref: 001D0628
                                                          • IcmpCreateFile.IPHLPAPI ref: 001D0636
                                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 001D06C6
                                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 001D06E5
                                                          • IcmpCloseHandle.IPHLPAPI(?), ref: 001D07B9
                                                          • WSACleanup.WSOCK32 ref: 001D07BF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                          • String ID: Ping
                                                          • API String ID: 1028309954-2246546115
                                                          • Opcode ID: 44c32890822c9c532b2425f2cade3adbcb48019f3d798834ccd20d2fc51d01e8
                                                          • Instruction ID: 58194f9d0007fd674435a1c6157beaeea044071dd070097ae3f2063987b2d907
                                                          • Opcode Fuzzy Hash: 44c32890822c9c532b2425f2cade3adbcb48019f3d798834ccd20d2fc51d01e8
                                                          • Instruction Fuzzy Hash: F3918D35604241DFD321CF15D888F1ABBE0AF48318F1585AAE8A98F7A2C730ED85CF91
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharLower
                                                          • String ID: cdecl$none$stdcall$winapi
                                                          • API String ID: 707087890-567219261
                                                          • Opcode ID: 97e319cc1f4d1c63df0c3dc43182b8fd5bd714363d02bb423b07143cc3c0fd47
                                                          • Instruction ID: 5f0982ae894e8238029aeefaaa77e074638e24d98e989f3428fa7595c8818f0b
                                                          • Opcode Fuzzy Hash: 97e319cc1f4d1c63df0c3dc43182b8fd5bd714363d02bb423b07143cc3c0fd47
                                                          • Instruction Fuzzy Hash: 2F518F31A005169BCB14DFACC9519BEB7B6BF64724B21422AE926EB3C5DB31DD40CB90
                                                          APIs
                                                          • CoInitialize.OLE32 ref: 001D3774
                                                          • CoUninitialize.OLE32 ref: 001D377F
                                                          • CoCreateInstance.OLE32(?,00000000,00000017,001EFB78,?), ref: 001D37D9
                                                          • IIDFromString.OLE32(?,?), ref: 001D384C
                                                          • VariantInit.OLEAUT32(?), ref: 001D38E4
                                                          • VariantClear.OLEAUT32(?), ref: 001D3936
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                          • API String ID: 636576611-1287834457
                                                          • Opcode ID: 26a34605ebde82765aea5b88fd4a9beb71e586d2d7afcaf8289edb1ab7af3523
                                                          • Instruction ID: a01d85e0f76755317210e505bc02e54ef19713a25eea21aaa94ba7c70586d895
                                                          • Opcode Fuzzy Hash: 26a34605ebde82765aea5b88fd4a9beb71e586d2d7afcaf8289edb1ab7af3523
                                                          • Instruction Fuzzy Hash: CA61BD71608701AFD311DF54D889FAAB7E4AF59710F00090AF9A59B391D770EE49CB93
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 001C33CF
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                          • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 001C33F0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: LoadString$_wcslen
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 4099089115-3080491070
                                                          • Opcode ID: 9d0e6b5906814e35bb7101453653720f41cd8d1f576ad78a51f99b10e66dcbc3
                                                          • Instruction ID: 2f3be01a5cb4db2a74959dc6d7d2a698dab39e530f351fa7e56499b1aee0ab2f
                                                          • Opcode Fuzzy Hash: 9d0e6b5906814e35bb7101453653720f41cd8d1f576ad78a51f99b10e66dcbc3
                                                          • Instruction Fuzzy Hash: 2E517D32900209EADF14EBE0DD46EEEB3B9AF24341F104065F92576052EB316F99DB61
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                          • API String ID: 1256254125-769500911
                                                          • Opcode ID: 5e61cc796b8e4d4dd46140f3a79dcc512ff5b9a6e0f3924c92c80154015e6503
                                                          • Instruction ID: 7d84508857b8142904e97931d9160cb344dc29acd4ebfb873b12cc164c0e5ad0
                                                          • Opcode Fuzzy Hash: 5e61cc796b8e4d4dd46140f3a79dcc512ff5b9a6e0f3924c92c80154015e6503
                                                          • Instruction Fuzzy Hash: 2141E532A080269BCB206F7DCCD05FEB7B5AFB0758B254229E425DB684E771CD82C790
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 001C53A0
                                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 001C5416
                                                          • GetLastError.KERNEL32 ref: 001C5420
                                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 001C54A7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Error$Mode$DiskFreeLastSpace
                                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                          • API String ID: 4194297153-14809454
                                                          • Opcode ID: 96bf70644df40201847325b98e59b23318903a3cf59f32ecd3435cd3864d6435
                                                          • Instruction ID: 09da3bc0d98dc47d871e7cf9f78152a67f4f57bbabdeb86ccc921b447bb7e0ee
                                                          • Opcode Fuzzy Hash: 96bf70644df40201847325b98e59b23318903a3cf59f32ecd3435cd3864d6435
                                                          • Instruction Fuzzy Hash: 84317035A00504DFC718DF68D884FA97BB5EB65305F148059E805CF292EB71EDC6CB91
                                                          APIs
                                                          • CreateMenu.USER32 ref: 001E3C79
                                                          • SetMenu.USER32(?,00000000), ref: 001E3C88
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 001E3D10
                                                          • IsMenu.USER32(?), ref: 001E3D24
                                                          • CreatePopupMenu.USER32 ref: 001E3D2E
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 001E3D5B
                                                          • DrawMenuBar.USER32 ref: 001E3D63
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                          • String ID: 0$F
                                                          • API String ID: 161812096-3044882817
                                                          • Opcode ID: ae89c32054be88d12ee2ae11e2c5db99d982552d5f3ec11c8b875881c19e8e51
                                                          • Instruction ID: 18ae5f605ad9eac59235659bf2f7f5eaa3b9ef28176a4dc0ee9ee0b86a5e9bdb
                                                          • Opcode Fuzzy Hash: ae89c32054be88d12ee2ae11e2c5db99d982552d5f3ec11c8b875881c19e8e51
                                                          • Instruction Fuzzy Hash: 44417974A01649AFDB14CFA5EC88EAE7BB5FF49310F140029E916AB360D730AA11CF90
                                                          APIs
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                            • Part of subcall function 001B3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 001B3CCA
                                                          • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 001B1F64
                                                          • GetDlgCtrlID.USER32 ref: 001B1F6F
                                                          • GetParent.USER32 ref: 001B1F8B
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 001B1F8E
                                                          • GetDlgCtrlID.USER32(?), ref: 001B1F97
                                                          • GetParent.USER32(?), ref: 001B1FAB
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 001B1FAE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 711023334-1403004172
                                                          • Opcode ID: d946f6fd9f5236bff5ec66642eb24c2e7f2401d4fd51b6f8be52217a669fda23
                                                          • Instruction ID: 2598b0d1373d26fc443f973232432081995f111fedf2495d41765fcfb99638b1
                                                          • Opcode Fuzzy Hash: d946f6fd9f5236bff5ec66642eb24c2e7f2401d4fd51b6f8be52217a669fda23
                                                          • Instruction Fuzzy Hash: 9C21C274900214FBCF04AFA0DC95DFFBBB9EF19310B500159F961AB291CB345959DBA0
                                                          APIs
                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 001E3A9D
                                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 001E3AA0
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 001E3AC7
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 001E3AEA
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 001E3B62
                                                          • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 001E3BAC
                                                          • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 001E3BC7
                                                          • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 001E3BE2
                                                          • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 001E3BF6
                                                          • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 001E3C13
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow
                                                          • String ID:
                                                          • API String ID: 312131281-0
                                                          • Opcode ID: a272117b10d27682ed1aae2a90248ca6001dff02e0c67bf8b3ea85c3cb7579b7
                                                          • Instruction ID: 04b3a16f3d4495431c7aa6e41ade9547e4e6684a0eed5e7b73af732561a361a7
                                                          • Opcode Fuzzy Hash: a272117b10d27682ed1aae2a90248ca6001dff02e0c67bf8b3ea85c3cb7579b7
                                                          • Instruction Fuzzy Hash: 22617D75900248AFDB20DFA8CC85EEE77F8EF09700F14419AFA15A72A1C770AE95DB50
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 001BB151
                                                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,001BA1E1,?,00000001), ref: 001BB165
                                                          • GetWindowThreadProcessId.USER32(00000000), ref: 001BB16C
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,001BA1E1,?,00000001), ref: 001BB17B
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 001BB18D
                                                          • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,001BA1E1,?,00000001), ref: 001BB1A6
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,001BA1E1,?,00000001), ref: 001BB1B8
                                                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,001BA1E1,?,00000001), ref: 001BB1FD
                                                          • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,001BA1E1,?,00000001), ref: 001BB212
                                                          • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,001BA1E1,?,00000001), ref: 001BB21D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                          • String ID:
                                                          • API String ID: 2156557900-0
                                                          • Opcode ID: 654c62a27570b78ee19c8b28fabfbcd65993d1b3a5e2c3037fdaaf554e8df0b6
                                                          • Instruction ID: 2d175b4aff59a45bd72852dfd78aa8648763b920c98e66da49e93ea10a1f8351
                                                          • Opcode Fuzzy Hash: 654c62a27570b78ee19c8b28fabfbcd65993d1b3a5e2c3037fdaaf554e8df0b6
                                                          • Instruction Fuzzy Hash: 85318D75604204BFDB20DFA5ECC8FAE7BA9BB55311F104005FA11DA690D7B8AE428FB0
                                                          APIs
                                                          • _free.LIBCMT ref: 00182C94
                                                            • Part of subcall function 001829C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0018D7D1,00000000,00000000,00000000,00000000,?,0018D7F8,00000000,00000007,00000000,?,0018DBF5,00000000), ref: 001829DE
                                                            • Part of subcall function 001829C8: GetLastError.KERNEL32(00000000,?,0018D7D1,00000000,00000000,00000000,00000000,?,0018D7F8,00000000,00000007,00000000,?,0018DBF5,00000000,00000000), ref: 001829F0
                                                          • _free.LIBCMT ref: 00182CA0
                                                          • _free.LIBCMT ref: 00182CAB
                                                          • _free.LIBCMT ref: 00182CB6
                                                          • _free.LIBCMT ref: 00182CC1
                                                          • _free.LIBCMT ref: 00182CCC
                                                          • _free.LIBCMT ref: 00182CD7
                                                          • _free.LIBCMT ref: 00182CE2
                                                          • _free.LIBCMT ref: 00182CED
                                                          • _free.LIBCMT ref: 00182CFB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 95da1c031ee306122840be37cedad6da0b2b5c24fc6b2fc5828e86c81bcf99d8
                                                          • Instruction ID: 0c113e094b7362c6eeb317cd355b9f83e54567ea10f099f10c4a71faef98aed4
                                                          • Opcode Fuzzy Hash: 95da1c031ee306122840be37cedad6da0b2b5c24fc6b2fc5828e86c81bcf99d8
                                                          • Instruction Fuzzy Hash: 0E119076900118AFCB02FF94D982CDD3BA9FF15354F8245A5FA489B222DB35EB509F90
                                                          APIs
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 001C7FAD
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 001C7FC1
                                                          • GetFileAttributesW.KERNEL32(?), ref: 001C7FEB
                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 001C8005
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 001C8017
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 001C8060
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 001C80B0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$AttributesFile
                                                          • String ID: *.*
                                                          • API String ID: 769691225-438819550
                                                          • Opcode ID: 6fe8a42e36619df4613b1963c7ba7c68caa64e2cf5fd802dfd1b25f4baba19a9
                                                          • Instruction ID: 63f228ac712a63086bdaff6c73e5c3d1aac54a86de6cf9e3b6ccae7736f52cfd
                                                          • Opcode Fuzzy Hash: 6fe8a42e36619df4613b1963c7ba7c68caa64e2cf5fd802dfd1b25f4baba19a9
                                                          • Instruction Fuzzy Hash: C08180725082459BCB24DF54C884EAEB3E8BBA5310F144C5EF895DB290EB74DD49CB92
                                                          APIs
                                                          • SetWindowLongW.USER32(?,000000EB), ref: 00155C7A
                                                            • Part of subcall function 00155D0A: GetClientRect.USER32(?,?), ref: 00155D30
                                                            • Part of subcall function 00155D0A: GetWindowRect.USER32(?,?), ref: 00155D71
                                                            • Part of subcall function 00155D0A: ScreenToClient.USER32(?,?), ref: 00155D99
                                                          • GetDC.USER32 ref: 001946F5
                                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00194708
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00194716
                                                          • SelectObject.GDI32(00000000,00000000), ref: 0019472B
                                                          • ReleaseDC.USER32(?,00000000), ref: 00194733
                                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 001947C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                          • String ID: U
                                                          • API String ID: 4009187628-3372436214
                                                          • Opcode ID: 4709d1af2c0a1db88f00c5d80f646fae261bed71f98ea2bc973abc356df29a41
                                                          • Instruction ID: 6498488b2e8d0f5ba0a78d6018628a6710811319da89850cd1f0c2fb30ad8ad8
                                                          • Opcode Fuzzy Hash: 4709d1af2c0a1db88f00c5d80f646fae261bed71f98ea2bc973abc356df29a41
                                                          • Instruction Fuzzy Hash: 4971E035400209DFCF29CFA4CD84EBA3BB6FF5A365F144269ED655A266C3319882DF60
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 001C35E4
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                          • LoadStringW.USER32(00222390,?,00000FFF,?), ref: 001C360A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: LoadString$_wcslen
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 4099089115-2391861430
                                                          • Opcode ID: 468ca24d5d2432641f9604b3b3dab55d5257b032a5302de04b206e46e17be89b
                                                          • Instruction ID: 7853ff7d389bcda5a24bc83ca19cb1c897d87b501431a0cb87e1abdaa31dc9a3
                                                          • Opcode Fuzzy Hash: 468ca24d5d2432641f9604b3b3dab55d5257b032a5302de04b206e46e17be89b
                                                          • Instruction Fuzzy Hash: 04518F72800209FACF14EBE0DC46EEEBB75AF24341F144169F525760A1EB315B99DFA1
                                                          APIs
                                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 001CC272
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 001CC29A
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 001CC2CA
                                                          • GetLastError.KERNEL32 ref: 001CC322
                                                          • SetEvent.KERNEL32(?), ref: 001CC336
                                                          • InternetCloseHandle.WININET(00000000), ref: 001CC341
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                          • String ID:
                                                          • API String ID: 3113390036-3916222277
                                                          • Opcode ID: a299f9cefe0df17a29c746ef53ee6a913507f031fa5333c2c3f3b005b0f1d451
                                                          • Instruction ID: f663a7b71e98c8daa85890c1a540bafe6b9a7abfa7ca6c5661b1e4a7fbc249f9
                                                          • Opcode Fuzzy Hash: a299f9cefe0df17a29c746ef53ee6a913507f031fa5333c2c3f3b005b0f1d451
                                                          • Instruction Fuzzy Hash: 80319AB1A00248AFD7219FA49C88FAF7BFCFB69740B14851EF44A96601DB30DD458BE1
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00193AAF,?,?,Bad directive syntax error,001ECC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 001B98BC
                                                          • LoadStringW.USER32(00000000,?,00193AAF,?), ref: 001B98C3
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 001B9987
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadMessageModuleString_wcslen
                                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                          • API String ID: 858772685-4153970271
                                                          • Opcode ID: a7e18f179cff5b06543278216a804e5208ae76de2d69f84a5d381ad4e6c6c8fc
                                                          • Instruction ID: 4f2232bbc9713799403ba3055ec96d59f5f482d8336c8012b1ae1e8af6dc32bb
                                                          • Opcode Fuzzy Hash: a7e18f179cff5b06543278216a804e5208ae76de2d69f84a5d381ad4e6c6c8fc
                                                          • Instruction Fuzzy Hash: CA21B131C0021EEBCF15AF90CC0AEEE7775FF29305F044469F9256A0A2EB319668DB51
                                                          APIs
                                                          • GetParent.USER32 ref: 001B20AB
                                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 001B20C0
                                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 001B214D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameParentSend
                                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                          • API String ID: 1290815626-3381328864
                                                          • Opcode ID: 9794a5faadf5d0027b5845e033ed6e04e597a550aa79247c64fcb5bc973b4163
                                                          • Instruction ID: 5c76f2a68032a52c293b56e7d136ac733978ade2fbf1b443d5b427bb16202958
                                                          • Opcode Fuzzy Hash: 9794a5faadf5d0027b5845e033ed6e04e597a550aa79247c64fcb5bc973b4163
                                                          • Instruction Fuzzy Hash: 1A1159B668C316FAF6052224DC07CEB33ECCB25328B204056FB09E50D6FF7568965A54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 166d44584bb2a3a6ae2c315804138d004fc902f27391e7d01e07fc3301890a7c
                                                          • Instruction ID: 59b25734382bd75dfe965338c452cb5e218d0faaa72605c97b3ccbbd90172988
                                                          • Opcode Fuzzy Hash: 166d44584bb2a3a6ae2c315804138d004fc902f27391e7d01e07fc3301890a7c
                                                          • Instruction Fuzzy Hash: 56C1D474904249AFDB21EFE8D845BBDBBB4AF19310F184199F518A7392CB349A42CF61
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                          • String ID:
                                                          • API String ID: 1282221369-0
                                                          • Opcode ID: 3c98c0c01e8ab96126cf09d17c0149d01e21dcfcbe47278aada8a34afc7f2f91
                                                          • Instruction ID: eb05ad79db7cda97b2499ddfc2d2978f60a8ebdad785d0a0874c8060534e4d5e
                                                          • Opcode Fuzzy Hash: 3c98c0c01e8ab96126cf09d17c0149d01e21dcfcbe47278aada8a34afc7f2f91
                                                          • Instruction Fuzzy Hash: 3A616971904311AFEF32BFB4A885A6A7BA5EF11310F15416EFA4497282D7319F028FE0
                                                          APIs
                                                          • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 001E5186
                                                          • ShowWindow.USER32(?,00000000), ref: 001E51C7
                                                          • ShowWindow.USER32(?,00000005,?,00000000), ref: 001E51CD
                                                          • SetFocus.USER32(?,?,00000005,?,00000000), ref: 001E51D1
                                                            • Part of subcall function 001E6FBA: DeleteObject.GDI32(00000000), ref: 001E6FE6
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 001E520D
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 001E521A
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 001E524D
                                                          • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 001E5287
                                                          • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 001E5296
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                          • String ID:
                                                          • API String ID: 3210457359-0
                                                          • Opcode ID: 9dba0700e5ccaf4e96dcd9072f219bf48a1f6cbef9c34d8f61afc09c4abdb25d
                                                          • Instruction ID: 244c8ace9472afdb358f2c5fe20ab65c57c4035b10a20edc66d7e0a6973e05b4
                                                          • Opcode Fuzzy Hash: 9dba0700e5ccaf4e96dcd9072f219bf48a1f6cbef9c34d8f61afc09c4abdb25d
                                                          • Instruction Fuzzy Hash: 1F51B230A40E89FFEF249F66CC49BDD3B67EB15369F188011FA159A2E1C3719990DB41
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 001A6890
                                                          • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 001A68A9
                                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 001A68B9
                                                          • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 001A68D1
                                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 001A68F2
                                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00168874,00000000,00000000,00000000,000000FF,00000000), ref: 001A6901
                                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 001A691E
                                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00168874,00000000,00000000,00000000,000000FF,00000000), ref: 001A692D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                          • String ID:
                                                          • API String ID: 1268354404-0
                                                          • Opcode ID: b809d38f7904bdd02e0fd44cc2a41862e0ffb10893d197b789fa7a246a38eeea
                                                          • Instruction ID: 23563d28ac4f9157639af88e1291395521a0c3b3e5e40ad5a8840b47bc7470ee
                                                          • Opcode Fuzzy Hash: b809d38f7904bdd02e0fd44cc2a41862e0ffb10893d197b789fa7a246a38eeea
                                                          • Instruction Fuzzy Hash: 0F5178B4600309EFDB24CF64CC95FAA7BB5FB58750F144618F9129B2A0DB70E9A1DB50
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 001CC182
                                                          • GetLastError.KERNEL32 ref: 001CC195
                                                          • SetEvent.KERNEL32(?), ref: 001CC1A9
                                                            • Part of subcall function 001CC253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 001CC272
                                                            • Part of subcall function 001CC253: GetLastError.KERNEL32 ref: 001CC322
                                                            • Part of subcall function 001CC253: SetEvent.KERNEL32(?), ref: 001CC336
                                                            • Part of subcall function 001CC253: InternetCloseHandle.WININET(00000000), ref: 001CC341
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                          • String ID:
                                                          • API String ID: 337547030-0
                                                          • Opcode ID: d8deb1957c58f06fecd4321a1dbf19ffd959cb8d525f61751e650bf6b2231cdc
                                                          • Instruction ID: 25cae97be8119d56c23748b4a9aa0add55b2472566ab07a1cd5b4c9dbfc4242b
                                                          • Opcode Fuzzy Hash: d8deb1957c58f06fecd4321a1dbf19ffd959cb8d525f61751e650bf6b2231cdc
                                                          • Instruction Fuzzy Hash: BC317A71600645AFDB219FE5DC44F6ABBF9FF28300B04441DF95A86A10D730EC559BE0
                                                          APIs
                                                            • Part of subcall function 001B3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 001B3A57
                                                            • Part of subcall function 001B3A3D: GetCurrentThreadId.KERNEL32 ref: 001B3A5E
                                                            • Part of subcall function 001B3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001B25B3), ref: 001B3A65
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 001B25BD
                                                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 001B25DB
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 001B25DF
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 001B25E9
                                                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 001B2601
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 001B2605
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 001B260F
                                                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 001B2623
                                                          • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 001B2627
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                          • String ID:
                                                          • API String ID: 2014098862-0
                                                          • Opcode ID: c65987e5c2d811c1baad515b5560ecf26abb241ecc88b76545e4857b9323a341
                                                          • Instruction ID: b43eff342e9c73de3b9872ca5f6e660d22253134738b3947eeb015e9637f06dc
                                                          • Opcode Fuzzy Hash: c65987e5c2d811c1baad515b5560ecf26abb241ecc88b76545e4857b9323a341
                                                          • Instruction Fuzzy Hash: BA01D830390250BBFB1067A99CCAFD93F59DB5EB12F100011F314AF1D1CAF114858AA9
                                                          APIs
                                                          • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,001B1449,?,?,00000000), ref: 001B180C
                                                          • HeapAlloc.KERNEL32(00000000,?,001B1449,?,?,00000000), ref: 001B1813
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,001B1449,?,?,00000000), ref: 001B1828
                                                          • GetCurrentProcess.KERNEL32(?,00000000,?,001B1449,?,?,00000000), ref: 001B1830
                                                          • DuplicateHandle.KERNEL32(00000000,?,001B1449,?,?,00000000), ref: 001B1833
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,001B1449,?,?,00000000), ref: 001B1843
                                                          • GetCurrentProcess.KERNEL32(001B1449,00000000,?,001B1449,?,?,00000000), ref: 001B184B
                                                          • DuplicateHandle.KERNEL32(00000000,?,001B1449,?,?,00000000), ref: 001B184E
                                                          • CreateThread.KERNEL32(00000000,00000000,001B1874,00000000,00000000,00000000), ref: 001B1868
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                          • String ID:
                                                          • API String ID: 1957940570-0
                                                          • Opcode ID: 77764c59e3e4698007a99c9d2c179cb6a73aba88014122f389d4bd1131be896f
                                                          • Instruction ID: 5aaefe370039c895dcac839bfbf80743a51b81909f3c5b68d74561d24ab566c4
                                                          • Opcode Fuzzy Hash: 77764c59e3e4698007a99c9d2c179cb6a73aba88014122f389d4bd1131be896f
                                                          • Instruction Fuzzy Hash: D301BBB5240348FFE710ABA5DC8DF6B3BACEB89B11F414411FA05DF5A1CA709841CB60
                                                          APIs
                                                            • Part of subcall function 001BD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 001BD501
                                                            • Part of subcall function 001BD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 001BD50F
                                                            • Part of subcall function 001BD4DC: CloseHandle.KERNEL32(00000000), ref: 001BD5DC
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 001DA16D
                                                          • GetLastError.KERNEL32 ref: 001DA180
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 001DA1B3
                                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 001DA268
                                                          • GetLastError.KERNEL32(00000000), ref: 001DA273
                                                          • CloseHandle.KERNEL32(00000000), ref: 001DA2C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                          • String ID: SeDebugPrivilege
                                                          • API String ID: 2533919879-2896544425
                                                          • Opcode ID: 1d85f2412a1624c35d63f182410d6e6fb2cad18fdb0bf258e654341f79e88175
                                                          • Instruction ID: ec99e688dc56277af0985ba8bf64f683c6444608c4532f39bcc007c735729e7f
                                                          • Opcode Fuzzy Hash: 1d85f2412a1624c35d63f182410d6e6fb2cad18fdb0bf258e654341f79e88175
                                                          • Instruction Fuzzy Hash: E6618C312042429FD714DF19C894F1ABBE1AF54318F58849DE8668FBA2C772ED49CBD2
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 001E3925
                                                          • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 001E393A
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 001E3954
                                                          • _wcslen.LIBCMT ref: 001E3999
                                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 001E39C6
                                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 001E39F4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window_wcslen
                                                          • String ID: SysListView32
                                                          • API String ID: 2147712094-78025650
                                                          • Opcode ID: a135c13ea51f2964d0751807dc5f4ca7809efabed0c4a4e2975d80a924fa7936
                                                          • Instruction ID: 9db0d4df2c00c80341ee16081c51dc1334948c9655e67df7deb285624b15314b
                                                          • Opcode Fuzzy Hash: a135c13ea51f2964d0751807dc5f4ca7809efabed0c4a4e2975d80a924fa7936
                                                          • Instruction Fuzzy Hash: 1241E371A00658ABEF219FA5CC49FEE7BA9EF18354F100126F958E7281D3719E90CB90
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 001BBCFD
                                                          • IsMenu.USER32(00000000), ref: 001BBD1D
                                                          • CreatePopupMenu.USER32 ref: 001BBD53
                                                          • GetMenuItemCount.USER32(00DD55F8), ref: 001BBDA4
                                                          • InsertMenuItemW.USER32(00DD55F8,?,00000001,00000030), ref: 001BBDCC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                          • String ID: 0$2
                                                          • API String ID: 93392585-3793063076
                                                          • Opcode ID: 52128056aaac85130923b9c62f084c4e0da1d7efccbd9cc5b6b8c93d01afd0c2
                                                          • Instruction ID: bb0bc936a68165adbb68e0296196e86f49f71d1afac3797594fbcbf068e24f87
                                                          • Opcode Fuzzy Hash: 52128056aaac85130923b9c62f084c4e0da1d7efccbd9cc5b6b8c93d01afd0c2
                                                          • Instruction Fuzzy Hash: CB51BC70A082059BDF20DFE8C8C4BEEBBF4AF55318F148219E4119B690D7B89941CB61
                                                          APIs
                                                          • LoadIconW.USER32(00000000,00007F03), ref: 001BC913
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: IconLoad
                                                          • String ID: blank$info$question$stop$warning
                                                          • API String ID: 2457776203-404129466
                                                          • Opcode ID: 2c514eccabfc15adf1696b9e52baa5edfa602c58915372d3cc96f08d92bc6db4
                                                          • Instruction ID: f98782c61d5c66b75660f51c44c93885ee7c5e7323db40f275ea99c727471dd4
                                                          • Opcode Fuzzy Hash: 2c514eccabfc15adf1696b9e52baa5edfa602c58915372d3cc96f08d92bc6db4
                                                          • Instruction Fuzzy Hash: 85112732689307BBB7049B549C83CEE67ECDF66328B20402EF504E61C2E7A05E4152E4
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                          • String ID: 0.0.0.0
                                                          • API String ID: 642191829-3771769585
                                                          • Opcode ID: 90693481f88aa3ed509c73087e45359321f67f0e423fc76ee864dcc4deba3996
                                                          • Instruction ID: bf29c6a1b8a5b6bb706dbc54f105d5284fb8d8e6e3a6aa3477d1274e07d1fad6
                                                          • Opcode Fuzzy Hash: 90693481f88aa3ed509c73087e45359321f67f0e423fc76ee864dcc4deba3996
                                                          • Instruction Fuzzy Hash: E7112C31904205AFDB28AB64EC4ADDE77BCDF25715F0101A9F5059B091FF71CAC18A90
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$LocalTime
                                                          • String ID:
                                                          • API String ID: 952045576-0
                                                          • Opcode ID: bfab4b97eef427081d69d092a41d3d82759b8c6cce71aa5053466bf0277e0a68
                                                          • Instruction ID: 19010e2562ae34a959a41287c8e3916f8784c6c51ea4b9a37a15ce89ceb5bf6a
                                                          • Opcode Fuzzy Hash: bfab4b97eef427081d69d092a41d3d82759b8c6cce71aa5053466bf0277e0a68
                                                          • Instruction Fuzzy Hash: 8F41B065D1021876CB11EBF48C8A9CFB7B8AF59310F50C566E618E3122FB34E245C3A6
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,001A682C,00000004,00000000,00000000), ref: 0016F953
                                                          • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,001A682C,00000004,00000000,00000000), ref: 001AF3D1
                                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,001A682C,00000004,00000000,00000000), ref: 001AF454
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: be84a904a8e80a95fb94e1221479de74dc49398edc38001597caacc69e0811f2
                                                          • Instruction ID: e94ceb3c56ffcf0ba9b214efb9f8b4485fb1dc5b55187ef507d9665cf6d71f23
                                                          • Opcode Fuzzy Hash: be84a904a8e80a95fb94e1221479de74dc49398edc38001597caacc69e0811f2
                                                          • Instruction Fuzzy Hash: 4A410935608780BAD73D8B69AC8872A7BA2AF5631CF15443CF09756661C731A8D3C751
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 001E2D1B
                                                          • GetDC.USER32(00000000), ref: 001E2D23
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 001E2D2E
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 001E2D3A
                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 001E2D76
                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 001E2D87
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,001E5A65,?,?,000000FF,00000000,?,000000FF,?), ref: 001E2DC2
                                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 001E2DE1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                          • String ID:
                                                          • API String ID: 3864802216-0
                                                          • Opcode ID: a3777eac07b0b9a47bbecdd9593234ed874a199dd105b77f9ad4691d74c1b790
                                                          • Instruction ID: afb106ebb2db59178556dfafee4bfa6ac45bd29c4be9e90473ad9daad599c3e4
                                                          • Opcode Fuzzy Hash: a3777eac07b0b9a47bbecdd9593234ed874a199dd105b77f9ad4691d74c1b790
                                                          • Instruction Fuzzy Hash: C4318B72201694BBEB118F958C8AFEB3BADFB49721F044055FE089E291C6759C81CBA0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: c8b9c143c3571e2200eac6c3bafb2ce8a2e75001a987776ff9b8f08d8493fb09
                                                          • Instruction ID: 682f8180fb140e0e32a4be302102a355d1615436a367aa8c72d12408b50f7651
                                                          • Opcode Fuzzy Hash: c8b9c143c3571e2200eac6c3bafb2ce8a2e75001a987776ff9b8f08d8493fb09
                                                          • Instruction Fuzzy Hash: C5219571B40E0977E31857259D82FFE336FAF34398F644024FD099A581FB60EE1182A5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: NULL Pointer assignment$Not an Object type
                                                          • API String ID: 0-572801152
                                                          • Opcode ID: d54a8c75f8e0c8d6a7d3744647d111d5be6de08642d1b251c2aa446cf6d1831e
                                                          • Instruction ID: 3560b28db44aeef5e7eabe52e4c8c202c8b89c5d13e623014a1a6dceb9ec4828
                                                          • Opcode Fuzzy Hash: d54a8c75f8e0c8d6a7d3744647d111d5be6de08642d1b251c2aa446cf6d1831e
                                                          • Instruction Fuzzy Hash: B0D1A375A0060AAFDF14CF98C881FAEB7B6BF58344F14816AE915AB381D770DD45CB90
                                                          APIs
                                                          • GetCPInfo.KERNEL32(?,?), ref: 001915CE
                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00191651
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 001916E4
                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 001916FB
                                                            • Part of subcall function 00183820: RtlAllocateHeap.NTDLL(00000000,?,00221444,?,0016FDF5,?,?,0015A976,00000010,00221440,001513FC,?,001513C6,?,00151129), ref: 00183852
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00191777
                                                          • __freea.LIBCMT ref: 001917A2
                                                          • __freea.LIBCMT ref: 001917AE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                          • String ID:
                                                          • API String ID: 2829977744-0
                                                          • Opcode ID: 5049ad808e388f8e04065e17c1c95628c894ec8347da765511675c85cfeac180
                                                          • Instruction ID: 810b5fdb06090c8d00c7f64b38a95847b10edb0fcfd4a2fd07fd7a2f8f47280d
                                                          • Opcode Fuzzy Hash: 5049ad808e388f8e04065e17c1c95628c894ec8347da765511675c85cfeac180
                                                          • Instruction Fuzzy Hash: 6691C672E00217BAEF258EB4CC81AEE7BB5AF5A710F1A4659E901E7141D735DDC0CBA0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit
                                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                          • API String ID: 2610073882-625585964
                                                          • Opcode ID: 7c62e2ce4a4624d320c31713099a65d7dabb0f76144df37ab751f91c775b7449
                                                          • Instruction ID: 57a0338dcf22794d1dad4bf5452eefe52044abafc1237a82b094850b477e9130
                                                          • Opcode Fuzzy Hash: 7c62e2ce4a4624d320c31713099a65d7dabb0f76144df37ab751f91c775b7449
                                                          • Instruction Fuzzy Hash: D8919E71A00219ABDF24CFA5DC88FEEBBB8EF56714F10855AF515AB280D7709941CFA0
                                                          APIs
                                                          • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 001C125C
                                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 001C1284
                                                          • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 001C12A8
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 001C12D8
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 001C135F
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 001C13C4
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 001C1430
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                          • String ID:
                                                          • API String ID: 2550207440-0
                                                          • Opcode ID: 921e0cbefb5adac7149d1a894ad38be9f62d63271bd779683035abdc6e61d72e
                                                          • Instruction ID: 5adb90f8b5bb69ad778708e3e2fd8a1adf3db86139209ecab48879971ab4994a
                                                          • Opcode Fuzzy Hash: 921e0cbefb5adac7149d1a894ad38be9f62d63271bd779683035abdc6e61d72e
                                                          • Instruction Fuzzy Hash: A791CE76A40218AFDB059FA4C885FAEB7B5FF66315F204029E910EB292D774E941CB90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: f8768f430eebdfdda10ec9d8c8cfe4aae5b670a84d9c746c21577591209478ba
                                                          • Instruction ID: ef8d196e12e32cea5d0e1c3bcd1193507a7d2b171d7817dbc55942b3080245ad
                                                          • Opcode Fuzzy Hash: f8768f430eebdfdda10ec9d8c8cfe4aae5b670a84d9c746c21577591209478ba
                                                          • Instruction Fuzzy Hash: 6C913975D00219EFCB14CFA9CC84AEEBBB8FF49320F14415AE516B7251D774AA52CBA0
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 001D396B
                                                          • CharUpperBuffW.USER32(?,?), ref: 001D3A7A
                                                          • _wcslen.LIBCMT ref: 001D3A8A
                                                          • VariantClear.OLEAUT32(?), ref: 001D3C1F
                                                            • Part of subcall function 001C0CDF: VariantInit.OLEAUT32(00000000), ref: 001C0D1F
                                                            • Part of subcall function 001C0CDF: VariantCopy.OLEAUT32(?,?), ref: 001C0D28
                                                            • Part of subcall function 001C0CDF: VariantClear.OLEAUT32(?), ref: 001C0D34
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                          • API String ID: 4137639002-1221869570
                                                          • Opcode ID: 5d30af63a06233fcf2c5405885f3cb769c4738bfc932db06cd6582530efe114f
                                                          • Instruction ID: d59f9b4b4d00e01cb4ea84a3029495dd67bd2261d3ee5dee213dc65927c66740
                                                          • Opcode Fuzzy Hash: 5d30af63a06233fcf2c5405885f3cb769c4738bfc932db06cd6582530efe114f
                                                          • Instruction Fuzzy Hash: 889146756083059FC704DF68C48196AB7E4FF99314F14892EF8A99B351DB30EE4ACB92
                                                          APIs
                                                            • Part of subcall function 001B000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,001AFF41,80070057,?,?,?,001B035E), ref: 001B002B
                                                            • Part of subcall function 001B000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,001AFF41,80070057,?,?), ref: 001B0046
                                                            • Part of subcall function 001B000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,001AFF41,80070057,?,?), ref: 001B0054
                                                            • Part of subcall function 001B000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,001AFF41,80070057,?), ref: 001B0064
                                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 001D4C51
                                                          • _wcslen.LIBCMT ref: 001D4D59
                                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 001D4DCF
                                                          • CoTaskMemFree.OLE32(?), ref: 001D4DDA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                          • String ID: NULL Pointer assignment
                                                          • API String ID: 614568839-2785691316
                                                          • Opcode ID: a28cd172c980bb7c2b72dfe04b3e9b985ea876434fb7076bf28810a20e567230
                                                          • Instruction ID: 497e6a480804c7b526e933b0ee2296550c55920cdd8f40c58cd4bd61804da7a2
                                                          • Opcode Fuzzy Hash: a28cd172c980bb7c2b72dfe04b3e9b985ea876434fb7076bf28810a20e567230
                                                          • Instruction Fuzzy Hash: AD912871D0021DEFDF14DFA4D890AEEB7B9BF18300F10856AE915AB251EB349A45CFA0
                                                          APIs
                                                          • GetMenu.USER32(?), ref: 001E2183
                                                          • GetMenuItemCount.USER32(00000000), ref: 001E21B5
                                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 001E21DD
                                                          • _wcslen.LIBCMT ref: 001E2213
                                                          • GetMenuItemID.USER32(?,?), ref: 001E224D
                                                          • GetSubMenu.USER32(?,?), ref: 001E225B
                                                            • Part of subcall function 001B3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 001B3A57
                                                            • Part of subcall function 001B3A3D: GetCurrentThreadId.KERNEL32 ref: 001B3A5E
                                                            • Part of subcall function 001B3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001B25B3), ref: 001B3A65
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 001E22E3
                                                            • Part of subcall function 001BE97B: Sleep.KERNELBASE ref: 001BE9F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                          • String ID:
                                                          • API String ID: 4196846111-0
                                                          • Opcode ID: 00c92e01c3c42516e365e10efe8d32462d1542abf922bf45dea17304762dfc64
                                                          • Instruction ID: 6abf312e980f005740193208f491d0deae66b1fa474671bff13df6a85d3f70ab
                                                          • Opcode Fuzzy Hash: 00c92e01c3c42516e365e10efe8d32462d1542abf922bf45dea17304762dfc64
                                                          • Instruction Fuzzy Hash: 6C71AE35A00645AFCB14DFA5C891AAEB7F9FF88310F158459E916EB341D734AE42CB90
                                                          APIs
                                                          • IsWindow.USER32(00DD5698), ref: 001E7F37
                                                          • IsWindowEnabled.USER32(00DD5698), ref: 001E7F43
                                                          • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 001E801E
                                                          • SendMessageW.USER32(00DD5698,000000B0,?,?), ref: 001E8051
                                                          • IsDlgButtonChecked.USER32(?,?), ref: 001E8089
                                                          • GetWindowLongW.USER32(00DD5698,000000EC), ref: 001E80AB
                                                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 001E80C3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                          • String ID:
                                                          • API String ID: 4072528602-0
                                                          • Opcode ID: 1880ba6eab208c07eae9ce929a97bdb9f7cffe61b5dc80ac2902afa0b0a725da
                                                          • Instruction ID: ff185b5b5b1fa90f811d22d83a4a6d411a4aaa74a8088efb7cf4871b5b729cce
                                                          • Opcode Fuzzy Hash: 1880ba6eab208c07eae9ce929a97bdb9f7cffe61b5dc80ac2902afa0b0a725da
                                                          • Instruction Fuzzy Hash: E571BE34608A84AFEF259F56CC84FEE7BB9EF19300F140459F965972A1CB31AC85CB50
                                                          APIs
                                                          • GetParent.USER32(?), ref: 001BAEF9
                                                          • GetKeyboardState.USER32(?), ref: 001BAF0E
                                                          • SetKeyboardState.USER32(?), ref: 001BAF6F
                                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 001BAF9D
                                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 001BAFBC
                                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 001BAFFD
                                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 001BB020
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 786c580ce47c0f453a70814c55d2e0c58b5650b15826ce62ce52383e5c87b576
                                                          • Instruction ID: dac5de2974aca9ccb496804d4b9a7f551d9fde4a4f99d0f320c6b5ec96ce985f
                                                          • Opcode Fuzzy Hash: 786c580ce47c0f453a70814c55d2e0c58b5650b15826ce62ce52383e5c87b576
                                                          • Instruction Fuzzy Hash: AF5190A06086D53DFB3652348C85BFBBEA95F06304F088589F1D9958C2D3D9ECC8D751
                                                          APIs
                                                          • GetParent.USER32(00000000), ref: 001BAD19
                                                          • GetKeyboardState.USER32(?), ref: 001BAD2E
                                                          • SetKeyboardState.USER32(?), ref: 001BAD8F
                                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 001BADBB
                                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 001BADD8
                                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 001BAE17
                                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 001BAE38
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: e489662e0194fa4dc151e090ed9b9a636defc6ab207cb37ed695ea6895ba3db1
                                                          • Instruction ID: b387c0bd654c96bad5cc1972d8742514232456cafa250787bba7d2ce5f0491fc
                                                          • Opcode Fuzzy Hash: e489662e0194fa4dc151e090ed9b9a636defc6ab207cb37ed695ea6895ba3db1
                                                          • Instruction Fuzzy Hash: D751E4A15487D53DFB378374CC95BFABEA96F46300F488588E1D54A8C2D394EC88D7A2
                                                          APIs
                                                          • GetConsoleCP.KERNEL32(00193CD6,?,?,?,?,?,?,?,?,00185BA3,?,?,00193CD6,?,?), ref: 00185470
                                                          • __fassign.LIBCMT ref: 001854EB
                                                          • __fassign.LIBCMT ref: 00185506
                                                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00193CD6,00000005,00000000,00000000), ref: 0018552C
                                                          • WriteFile.KERNEL32(?,00193CD6,00000000,00185BA3,00000000,?,?,?,?,?,?,?,?,?,00185BA3,?), ref: 0018554B
                                                          • WriteFile.KERNEL32(?,?,00000001,00185BA3,00000000,?,?,?,?,?,?,?,?,?,00185BA3,?), ref: 00185584
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                          • String ID:
                                                          • API String ID: 1324828854-0
                                                          • Opcode ID: 1d5916ab0e68bb1553ee2df6cfac5778df7a8bc65b6980f6f076bf363dcf3b42
                                                          • Instruction ID: dbde87495da6e2d9df10f0ebd46500292045b2dffb53d838f70d18f6778a6993
                                                          • Opcode Fuzzy Hash: 1d5916ab0e68bb1553ee2df6cfac5778df7a8bc65b6980f6f076bf363dcf3b42
                                                          • Instruction Fuzzy Hash: 87519F71A00649AFDB11DFA8D885AEEBBFAEF09300F14415AF955E7291E7309B41CF60
                                                          APIs
                                                          • _ValidateLocalCookies.LIBCMT ref: 00172D4B
                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00172D53
                                                          • _ValidateLocalCookies.LIBCMT ref: 00172DE1
                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00172E0C
                                                          • _ValidateLocalCookies.LIBCMT ref: 00172E61
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                          • String ID: csm
                                                          • API String ID: 1170836740-1018135373
                                                          • Opcode ID: 0557981be209ae9319fdff673b4b2b91529861c63093b03076ed0b93eef9aebd
                                                          • Instruction ID: 477094b1e5a97a89e4be78ca1f042e6d51c198d0134c82dffcc25e615776d1cc
                                                          • Opcode Fuzzy Hash: 0557981be209ae9319fdff673b4b2b91529861c63093b03076ed0b93eef9aebd
                                                          • Instruction Fuzzy Hash: 7741A234E00209ABCF20DFA8C855A9EBBB5BF58324F14C155E91C6B352D731EA42CB91
                                                          APIs
                                                            • Part of subcall function 001D304E: inet_addr.WSOCK32(?), ref: 001D307A
                                                            • Part of subcall function 001D304E: _wcslen.LIBCMT ref: 001D309B
                                                          • socket.WSOCK32(00000002,00000001,00000006), ref: 001D1112
                                                          • WSAGetLastError.WSOCK32 ref: 001D1121
                                                          • WSAGetLastError.WSOCK32 ref: 001D11C9
                                                          • closesocket.WSOCK32(00000000), ref: 001D11F9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 2675159561-0
                                                          • Opcode ID: cf86a321b6baff0bdfecc682bbd388cb8f7aba57d0507fac539f2506e8293487
                                                          • Instruction ID: 5d46c9ce26849d8d226e5e75222893cc1dfccead930eb3cead6aa1fa482eb0b6
                                                          • Opcode Fuzzy Hash: cf86a321b6baff0bdfecc682bbd388cb8f7aba57d0507fac539f2506e8293487
                                                          • Instruction Fuzzy Hash: 9441CE31600214BFDB109F68DC85BAABBAAEF45324F14805AFD159F392C770AD85CBE1
                                                          APIs
                                                            • Part of subcall function 001BDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,001BCF22,?), ref: 001BDDFD
                                                            • Part of subcall function 001BDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,001BCF22,?), ref: 001BDE16
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 001BCF45
                                                          • MoveFileW.KERNEL32(?,?), ref: 001BCF7F
                                                          • _wcslen.LIBCMT ref: 001BD005
                                                          • _wcslen.LIBCMT ref: 001BD01B
                                                          • SHFileOperationW.SHELL32(?), ref: 001BD061
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                          • String ID: \*.*
                                                          • API String ID: 3164238972-1173974218
                                                          • Opcode ID: 07b6e038156d44a0bfaa710b1aa537ad17ad3965e000988f53cd3c14596d8c86
                                                          • Instruction ID: 7a6d321314dcc24ece057635c3078f6289e0fde1407336d2bcc319d23819d719
                                                          • Opcode Fuzzy Hash: 07b6e038156d44a0bfaa710b1aa537ad17ad3965e000988f53cd3c14596d8c86
                                                          • Instruction Fuzzy Hash: EF4149719452199FDF16EFA4DD81AEE77F9AF18340F1000EAE509EB141EB34A689CB50
                                                          APIs
                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 001E2E1C
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 001E2E4F
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 001E2E84
                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 001E2EB6
                                                          • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 001E2EE0
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 001E2EF1
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 001E2F0B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$MessageSend
                                                          • String ID:
                                                          • API String ID: 2178440468-0
                                                          • Opcode ID: f7137c6276b2d57230518f611f7896d7d5b5296c6f3e617d9a52161d17c3f965
                                                          • Instruction ID: 43202794b62cd06218753f4d3c693f5e34e20336130b2ecdf1239d843a037169
                                                          • Opcode Fuzzy Hash: f7137c6276b2d57230518f611f7896d7d5b5296c6f3e617d9a52161d17c3f965
                                                          • Instruction Fuzzy Hash: 7B3108316046A0AFDB21CF99DC98FA937E9FB5A710F1911A4F9009F2B1CB71AC91DB41
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 001B7769
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 001B778F
                                                          • SysAllocString.OLEAUT32(00000000), ref: 001B7792
                                                          • SysAllocString.OLEAUT32(?), ref: 001B77B0
                                                          • SysFreeString.OLEAUT32(?), ref: 001B77B9
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 001B77DE
                                                          • SysAllocString.OLEAUT32(?), ref: 001B77EC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: c799e7ffcbd6c0c30fb9daf707d713eaf6656848437e85a63ba27047449cd644
                                                          • Instruction ID: cb906dba4ee217f17cb50b36e21795b3167de9c0b65025e98744507b7e5a2b72
                                                          • Opcode Fuzzy Hash: c799e7ffcbd6c0c30fb9daf707d713eaf6656848437e85a63ba27047449cd644
                                                          • Instruction Fuzzy Hash: E4218E76604259AFDB10EFA8DC88CFB77ACEB49764B148425FA15DB190DB70DC8287A0
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 001B7842
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 001B7868
                                                          • SysAllocString.OLEAUT32(00000000), ref: 001B786B
                                                          • SysAllocString.OLEAUT32 ref: 001B788C
                                                          • SysFreeString.OLEAUT32 ref: 001B7895
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 001B78AF
                                                          • SysAllocString.OLEAUT32(?), ref: 001B78BD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: 0c62123319802057dec801d0f1e9b5f2eaeabc68eb51afb7a61f0faf754ecbf1
                                                          • Instruction ID: f5bbfd388f81a2a7d1f77b45d8f07e63d5060fe6299f6363995339b153d9a049
                                                          • Opcode Fuzzy Hash: 0c62123319802057dec801d0f1e9b5f2eaeabc68eb51afb7a61f0faf754ecbf1
                                                          • Instruction Fuzzy Hash: 5C214135608204AFDB109FF8DC88DAA77ECEB497607118125F915CB2E1D774DC82CB64
                                                          APIs
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 001C04F2
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 001C052E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHandlePipe
                                                          • String ID: nul
                                                          • API String ID: 1424370930-2873401336
                                                          • Opcode ID: f2b1110ed284eba0a4c570e5795ea07994b71ffdff7ce92f006843478f2dd7c7
                                                          • Instruction ID: 17f9f21cde42401f42a5918665583ef1816dec9b1ca6d7bf3b88edd325880499
                                                          • Opcode Fuzzy Hash: f2b1110ed284eba0a4c570e5795ea07994b71ffdff7ce92f006843478f2dd7c7
                                                          • Instruction Fuzzy Hash: 88218B70500345EFCF218F68DC44F9A7BA4AF69724F204A1CE8A1D62E0D770D981CF60
                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 001C05C6
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 001C0601
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHandlePipe
                                                          • String ID: nul
                                                          • API String ID: 1424370930-2873401336
                                                          • Opcode ID: f6686247d817808ab471dd7bd956ee89a994200f721d1f5ca1d488c6ea65df39
                                                          • Instruction ID: b46ab60be6f027d9cb72d937c48068b8a0203cb22c03c77b3bffcc88db29af56
                                                          • Opcode Fuzzy Hash: f6686247d817808ab471dd7bd956ee89a994200f721d1f5ca1d488c6ea65df39
                                                          • Instruction Fuzzy Hash: 56217175500325DBDB219F698C44F9A77E4BFA9720F200A1DE9A1E72D0D770D8A1CB50
                                                          APIs
                                                            • Part of subcall function 0015600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0015604C
                                                            • Part of subcall function 0015600E: GetStockObject.GDI32(00000011), ref: 00156060
                                                            • Part of subcall function 0015600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0015606A
                                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 001E4112
                                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 001E411F
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 001E412A
                                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 001E4139
                                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 001E4145
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CreateObjectStockWindow
                                                          • String ID: Msctls_Progress32
                                                          • API String ID: 1025951953-3636473452
                                                          • Opcode ID: 88281d5183de89c9579b2907bcb0cdaf2ec05bac6c18a2bbe1e285c695779c11
                                                          • Instruction ID: 3af6deb1c6b9e997a32f805ed98ea598e133ac3b3ad986c9a2aa0f468f19b244
                                                          • Opcode Fuzzy Hash: 88281d5183de89c9579b2907bcb0cdaf2ec05bac6c18a2bbe1e285c695779c11
                                                          • Instruction Fuzzy Hash: 5311E2B2140219BFEF108FA5CC85EEB7FADEF18798F014110BA18A6190C7729C61DBA0
                                                          APIs
                                                            • Part of subcall function 0018D7A3: _free.LIBCMT ref: 0018D7CC
                                                          • _free.LIBCMT ref: 0018D82D
                                                            • Part of subcall function 001829C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0018D7D1,00000000,00000000,00000000,00000000,?,0018D7F8,00000000,00000007,00000000,?,0018DBF5,00000000), ref: 001829DE
                                                            • Part of subcall function 001829C8: GetLastError.KERNEL32(00000000,?,0018D7D1,00000000,00000000,00000000,00000000,?,0018D7F8,00000000,00000007,00000000,?,0018DBF5,00000000,00000000), ref: 001829F0
                                                          • _free.LIBCMT ref: 0018D838
                                                          • _free.LIBCMT ref: 0018D843
                                                          • _free.LIBCMT ref: 0018D897
                                                          • _free.LIBCMT ref: 0018D8A2
                                                          • _free.LIBCMT ref: 0018D8AD
                                                          • _free.LIBCMT ref: 0018D8B8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                          • Instruction ID: 38369d7d34ce96af2da375efbfe2ed07394711bc4936eb74495af0a8db797c9b
                                                          • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                          • Instruction Fuzzy Hash: 08112971940B14AAD622BFF0DC46FCB7B9CAF20704F400825F299A60D2DB79A6058B61
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 001BDA74
                                                          • LoadStringW.USER32(00000000), ref: 001BDA7B
                                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 001BDA91
                                                          • LoadStringW.USER32(00000000), ref: 001BDA98
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 001BDADC
                                                          Strings
                                                          • %s (%d) : ==> %s: %s %s, xrefs: 001BDAB9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message
                                                          • String ID: %s (%d) : ==> %s: %s %s
                                                          • API String ID: 4072794657-3128320259
                                                          • Opcode ID: e3c8d6bf6de33e032070eb1b0c6644fb44f5e2ebde7c211be519373dfb529808
                                                          • Instruction ID: 307d98c1b663cc4adc1a5832b386f99eec24c4ff6b4d9f4371b1c27d420e7ec3
                                                          • Opcode Fuzzy Hash: e3c8d6bf6de33e032070eb1b0c6644fb44f5e2ebde7c211be519373dfb529808
                                                          • Instruction Fuzzy Hash: F0014FF6900248BBEB109BE09D89EEB736CEB08301F400491F716E6041E7749EC58BB4
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(00DCE408,00DCE408), ref: 001C097B
                                                          • EnterCriticalSection.KERNEL32(00DCE3E8,00000000), ref: 001C098D
                                                          • TerminateThread.KERNEL32(?,000001F6), ref: 001C099B
                                                          • WaitForSingleObject.KERNEL32(?,000003E8), ref: 001C09A9
                                                          • CloseHandle.KERNEL32(?), ref: 001C09B8
                                                          • InterlockedExchange.KERNEL32(00DCE408,000001F6), ref: 001C09C8
                                                          • LeaveCriticalSection.KERNEL32(00DCE3E8), ref: 001C09CF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 3495660284-0
                                                          • Opcode ID: 8c7c595000582326b13e72698e6cbc663c3232aa1937eb027db5723c46413683
                                                          • Instruction ID: 809dfcb7bcae9916308aae877948b78256cccded7a25d989e805f40c1b95000a
                                                          • Opcode Fuzzy Hash: 8c7c595000582326b13e72698e6cbc663c3232aa1937eb027db5723c46413683
                                                          • Instruction Fuzzy Hash: 06F0C932442A52EBD7525BA4EEC9BDABA29BF05706F402025F20298CA1C77595A6CFD0
                                                          APIs
                                                          • GetClientRect.USER32(?,?), ref: 00155D30
                                                          • GetWindowRect.USER32(?,?), ref: 00155D71
                                                          • ScreenToClient.USER32(?,?), ref: 00155D99
                                                          • GetClientRect.USER32(?,?), ref: 00155ED7
                                                          • GetWindowRect.USER32(?,?), ref: 00155EF8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Rect$Client$Window$Screen
                                                          • String ID:
                                                          • API String ID: 1296646539-0
                                                          • Opcode ID: fe950350cae687c8c08077fbb9ef60d3171a77c43c0f18a7684714fc24d76ccc
                                                          • Instruction ID: 4c766da0461c17d82fafdd4c819ca0270f04f63460b0889441dc47fcffc00df1
                                                          • Opcode Fuzzy Hash: fe950350cae687c8c08077fbb9ef60d3171a77c43c0f18a7684714fc24d76ccc
                                                          • Instruction Fuzzy Hash: B7B17B35A0064ADBDF14CFA9C481BEEB7F2FF48311F14851AE8A9DB250D730AA55DB50
                                                          APIs
                                                          • __allrem.LIBCMT ref: 001800BA
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001800D6
                                                          • __allrem.LIBCMT ref: 001800ED
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0018010B
                                                          • __allrem.LIBCMT ref: 00180122
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00180140
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                          • String ID:
                                                          • API String ID: 1992179935-0
                                                          • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                          • Instruction ID: 8eb06c957246371daf8fd1cdcdf86d21b5240b5f5e0fa4e087c60e3c9423260f
                                                          • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                          • Instruction Fuzzy Hash: 1D81F672600B0AABE725AE68CC41B6B73F8AF55374F24823EF415D6281EB70DA458F50
                                                          APIs
                                                            • Part of subcall function 001D3149: select.WSOCK32(00000000,?,00000000,00000000,?), ref: 001D3195
                                                          • __WSAFDIsSet.WSOCK32(00000000,?), ref: 001D1DC0
                                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 001D1DE1
                                                          • WSAGetLastError.WSOCK32 ref: 001D1DF2
                                                          • inet_ntoa.WSOCK32(?), ref: 001D1E8C
                                                          • htons.WSOCK32(?), ref: 001D1EDB
                                                          • _strlen.LIBCMT ref: 001D1F35
                                                            • Part of subcall function 001B39E8: _strlen.LIBCMT ref: 001B39F2
                                                            • Part of subcall function 00156D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,0016CF58,?,?,?), ref: 00156DBA
                                                            • Part of subcall function 00156D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,0016CF58,?,?,?), ref: 00156DED
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                          • String ID:
                                                          • API String ID: 1923757996-0
                                                          • Opcode ID: b90d66eac06ed0af1e87091fe54e4c70452fe4c6dae8f9ce5424067251839339
                                                          • Instruction ID: 110e27a0a9d4169029ca6dbeff3527576870741600fb1bc50af3ac1c4a03e356
                                                          • Opcode Fuzzy Hash: b90d66eac06ed0af1e87091fe54e4c70452fe4c6dae8f9ce5424067251839339
                                                          • Instruction Fuzzy Hash: 6DA1AD31604340BFC324DF64C895E2A7BA5AF94318F54894DF8665F3A2DB31ED4ACB92
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,001782D9,001782D9,?,?,?,0018644F,00000001,00000001,8BE85006), ref: 00186258
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0018644F,00000001,00000001,8BE85006,?,?,?), ref: 001862DE
                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 001863D8
                                                          • __freea.LIBCMT ref: 001863E5
                                                            • Part of subcall function 00183820: RtlAllocateHeap.NTDLL(00000000,?,00221444,?,0016FDF5,?,?,0015A976,00000010,00221440,001513FC,?,001513C6,?,00151129), ref: 00183852
                                                          • __freea.LIBCMT ref: 001863EE
                                                          • __freea.LIBCMT ref: 00186413
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1414292761-0
                                                          • Opcode ID: 3b728338001f96fdbd858df7ad3b8e3f30e12f9ea88e87cb2f77bbe62de9dd68
                                                          • Instruction ID: 1fd19a3a683dd90f9c3194d2452c255ec1e1fcf483ff6df57f1810c5a722df95
                                                          • Opcode Fuzzy Hash: 3b728338001f96fdbd858df7ad3b8e3f30e12f9ea88e87cb2f77bbe62de9dd68
                                                          • Instruction Fuzzy Hash: 2A51E372A00216ABEB25AF64DC81EBF77AAEB54710F154669FC09D6140EB34DE40CBA0
                                                          APIs
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                            • Part of subcall function 001DC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,001DB6AE,?,?), ref: 001DC9B5
                                                            • Part of subcall function 001DC998: _wcslen.LIBCMT ref: 001DC9F1
                                                            • Part of subcall function 001DC998: _wcslen.LIBCMT ref: 001DCA68
                                                            • Part of subcall function 001DC998: _wcslen.LIBCMT ref: 001DCA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001DBCCA
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 001DBD25
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 001DBD6A
                                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 001DBD99
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 001DBDF3
                                                          • RegCloseKey.ADVAPI32(?), ref: 001DBDFF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                          • String ID:
                                                          • API String ID: 1120388591-0
                                                          • Opcode ID: 2f03d28d106bb028b584cf4c598d7f7d6267ad02a09dd6e6b9af564612bda3c8
                                                          • Instruction ID: 42bde17ac3582255cd1b4549f87c6d3955c3115c7d467b7c781cb4737f9ff630
                                                          • Opcode Fuzzy Hash: 2f03d28d106bb028b584cf4c598d7f7d6267ad02a09dd6e6b9af564612bda3c8
                                                          • Instruction Fuzzy Hash: 58815830218241EFD714DF64C8D5E2ABBE5BF84308F15895DF45A8B2A2DB31ED49CB92
                                                          APIs
                                                          • VariantInit.OLEAUT32(00000035), ref: 001AF7B9
                                                          • SysAllocString.OLEAUT32(00000001), ref: 001AF860
                                                          • VariantCopy.OLEAUT32(001AFA64,00000000), ref: 001AF889
                                                          • VariantClear.OLEAUT32(001AFA64), ref: 001AF8AD
                                                          • VariantCopy.OLEAUT32(001AFA64,00000000), ref: 001AF8B1
                                                          • VariantClear.OLEAUT32(?), ref: 001AF8BB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCopy$AllocInitString
                                                          • String ID:
                                                          • API String ID: 3859894641-0
                                                          • Opcode ID: fb230199f9239bab9506fc33bce02f669c2af21c4ce9a9633f6695a316a5faba
                                                          • Instruction ID: f1f7d82d9ffd6fe9d8fbcbf07cba01a9535c2d1ee1c0cf9bb178335d808c3762
                                                          • Opcode Fuzzy Hash: fb230199f9239bab9506fc33bce02f669c2af21c4ce9a9633f6695a316a5faba
                                                          • Instruction Fuzzy Hash: EC51E639600310FACF24AFE5D895B2AB3A4EF56314F24846EF805DF292DB708C46C796
                                                          APIs
                                                            • Part of subcall function 00157620: _wcslen.LIBCMT ref: 00157625
                                                            • Part of subcall function 00156B57: _wcslen.LIBCMT ref: 00156B6A
                                                          • GetOpenFileNameW.COMDLG32(00000058), ref: 001C94E5
                                                          • _wcslen.LIBCMT ref: 001C9506
                                                          • _wcslen.LIBCMT ref: 001C952D
                                                          • GetSaveFileNameW.COMDLG32(00000058), ref: 001C9585
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$FileName$OpenSave
                                                          • String ID: X
                                                          • API String ID: 83654149-3081909835
                                                          • Opcode ID: 3f7a7b556660c17dd6d1908441e770d7d3334eefdf97e9a15f8cdff40c7b3f46
                                                          • Instruction ID: 37d7729b8ed6b7631e48bcc52184e210e9ec09c6ecc407711d5054586c10c067
                                                          • Opcode Fuzzy Hash: 3f7a7b556660c17dd6d1908441e770d7d3334eefdf97e9a15f8cdff40c7b3f46
                                                          • Instruction Fuzzy Hash: 78E17D31608340CFD724DF24D885F6AB7E4BFA5314F04896DE8999B2A2DB31ED05CB92
                                                          APIs
                                                            • Part of subcall function 00169BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00169BB2
                                                          • BeginPaint.USER32(?,?,?), ref: 00169241
                                                          • GetWindowRect.USER32(?,?), ref: 001692A5
                                                          • ScreenToClient.USER32(?,?), ref: 001692C2
                                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 001692D3
                                                          • EndPaint.USER32(?,?,?,?,?), ref: 00169321
                                                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 001A71EA
                                                            • Part of subcall function 00169339: BeginPath.GDI32(00000000), ref: 00169357
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                          • String ID:
                                                          • API String ID: 3050599898-0
                                                          • Opcode ID: ac00d48b234ae191ff4e56c95280cddfd7c12fccb12e865502c1375fbe6f4afd
                                                          • Instruction ID: e3f17082091fab33466ab6a96b2a2e448dee293f57cc5e4513a5d86994d9b1a0
                                                          • Opcode Fuzzy Hash: ac00d48b234ae191ff4e56c95280cddfd7c12fccb12e865502c1375fbe6f4afd
                                                          • Instruction Fuzzy Hash: 16419C70104340AFD721DF64DC98FBA7BF8EF6A320F040629F9958A2E1C7309996DB61
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 001C080C
                                                          • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 001C0847
                                                          • EnterCriticalSection.KERNEL32(?), ref: 001C0863
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 001C08DC
                                                          • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 001C08F3
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 001C0921
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                          • String ID:
                                                          • API String ID: 3368777196-0
                                                          • Opcode ID: 710a286bc8a4f5f8632926e9791bc4181fd32d9cde98bfd14573262b8aabad18
                                                          • Instruction ID: 40eefa7bc225ed5c3c96a4aef5b264e3deb351253f720c211d7a5a8b59bb16a6
                                                          • Opcode Fuzzy Hash: 710a286bc8a4f5f8632926e9791bc4181fd32d9cde98bfd14573262b8aabad18
                                                          • Instruction Fuzzy Hash: 5C415971900205EFDF15DF94DC85AAA7B78FF18304F1480A9ED049E296DB31DE61DBA0
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,001AF3AB,00000000,?,?,00000000,?,001A682C,00000004,00000000,00000000), ref: 001E824C
                                                          • EnableWindow.USER32(?,00000000), ref: 001E8272
                                                          • ShowWindow.USER32(FFFFFFFF,00000000), ref: 001E82D1
                                                          • ShowWindow.USER32(?,00000004), ref: 001E82E5
                                                          • EnableWindow.USER32(?,00000001), ref: 001E830B
                                                          • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 001E832F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Show$Enable$MessageSend
                                                          • String ID:
                                                          • API String ID: 642888154-0
                                                          • Opcode ID: 5f6f30066f2ed0836497ab1acaa18070f89960b560cc21f93387ad9b6bf64ce7
                                                          • Instruction ID: cca08732221f6631991a18f305139e08a607bd0108c0290c16858dab09530b92
                                                          • Opcode Fuzzy Hash: 5f6f30066f2ed0836497ab1acaa18070f89960b560cc21f93387ad9b6bf64ce7
                                                          • Instruction Fuzzy Hash: 8741B730601A85AFDB25CF56DC99FEC7BF1BB0A714F185165E60C5F262C7329892CB50
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 001B4C95
                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 001B4CB2
                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 001B4CEA
                                                          • _wcslen.LIBCMT ref: 001B4D08
                                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 001B4D10
                                                          • _wcsstr.LIBVCRUNTIME ref: 001B4D1A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                          • String ID:
                                                          • API String ID: 72514467-0
                                                          • Opcode ID: 55405821e6d6521242f49b7f227f97b47d79c2351698a50f83aec591f2365c51
                                                          • Instruction ID: 742ff14f090db849000eaef8a71943afa85fa0da5945b6a5960d49622edf07c3
                                                          • Opcode Fuzzy Hash: 55405821e6d6521242f49b7f227f97b47d79c2351698a50f83aec591f2365c51
                                                          • Instruction Fuzzy Hash: F821D7726042407BEB155B69AC49EBF7FA8DF59750F11C02DF805CA192DB61DC4196A0
                                                          APIs
                                                            • Part of subcall function 00153AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00153A97,?,?,00152E7F,?,?,?,00000000), ref: 00153AC2
                                                          • _wcslen.LIBCMT ref: 001C587B
                                                          • CoInitialize.OLE32(00000000), ref: 001C5995
                                                          • CoCreateInstance.OLE32(001EFCF8,00000000,00000001,001EFB68,?), ref: 001C59AE
                                                          • CoUninitialize.OLE32 ref: 001C59CC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 3172280962-24824748
                                                          • Opcode ID: 63a2ac4eb045eee8d551f8bc96e8d1394cddc385fe33bbe81a88d39b485360d8
                                                          • Instruction ID: d60a67b7bd19b24fd414f12727999b67ecb328df10f6bf7501a01f0b5f8f4a22
                                                          • Opcode Fuzzy Hash: 63a2ac4eb045eee8d551f8bc96e8d1394cddc385fe33bbe81a88d39b485360d8
                                                          • Instruction Fuzzy Hash: BFD15370608601DFC714DF25C480E2ABBE2EFA9714F14895DF8999B261DB31EC85CB92
                                                          APIs
                                                            • Part of subcall function 001B0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 001B0FCA
                                                            • Part of subcall function 001B0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 001B0FD6
                                                            • Part of subcall function 001B0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 001B0FE5
                                                            • Part of subcall function 001B0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 001B0FEC
                                                            • Part of subcall function 001B0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 001B1002
                                                          • GetLengthSid.ADVAPI32(?,00000000,001B1335), ref: 001B17AE
                                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 001B17BA
                                                          • HeapAlloc.KERNEL32(00000000), ref: 001B17C1
                                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 001B17DA
                                                          • GetProcessHeap.KERNEL32(00000000,00000000,001B1335), ref: 001B17EE
                                                          • HeapFree.KERNEL32(00000000), ref: 001B17F5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                          • String ID:
                                                          • API String ID: 3008561057-0
                                                          • Opcode ID: d529cdcaea8919bbba34e8a3e708cb6df7df20d351e1be0a536e471bcb4253ca
                                                          • Instruction ID: 9bdba7d5ed79effe2f19decd985b90da71ac4154b65a8dae48d3fded57f53bca
                                                          • Opcode Fuzzy Hash: d529cdcaea8919bbba34e8a3e708cb6df7df20d351e1be0a536e471bcb4253ca
                                                          • Instruction Fuzzy Hash: 63118E32610205FFDB14DFA4CC99BEF7BA9EB46355F514018F8419B210DB35A985CBA0
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 001B14FF
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 001B1506
                                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 001B1515
                                                          • CloseHandle.KERNEL32(00000004), ref: 001B1520
                                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 001B154F
                                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 001B1563
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                          • String ID:
                                                          • API String ID: 1413079979-0
                                                          • Opcode ID: 13078e0fb678091ec4689d2016869440b71f2c6a7601e65975d610e4f2c178bf
                                                          • Instruction ID: 9fd0c342ae758b208084461b0f4f77411ebec2354e7fd8ba1775e9e794bc42df
                                                          • Opcode Fuzzy Hash: 13078e0fb678091ec4689d2016869440b71f2c6a7601e65975d610e4f2c178bf
                                                          • Instruction Fuzzy Hash: 6C111472504249BBDB11CFA8ED89BDE7BA9EB49744F054025FA05A6060C3758EA19BA0
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,00173379,00172FE5), ref: 00173390
                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0017339E
                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 001733B7
                                                          • SetLastError.KERNEL32(00000000,?,00173379,00172FE5), ref: 00173409
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastValue___vcrt_
                                                          • String ID:
                                                          • API String ID: 3852720340-0
                                                          • Opcode ID: c5869a3557cd8b4b953a3c7c438a6d82c3ba8c25f823f62f4ac0bab58f51314d
                                                          • Instruction ID: 89c7aa992c07e4f2d5d8f5472a7b7dc0ee6c9981b0f26c1bfde835c32abed7be
                                                          • Opcode Fuzzy Hash: c5869a3557cd8b4b953a3c7c438a6d82c3ba8c25f823f62f4ac0bab58f51314d
                                                          • Instruction Fuzzy Hash: 5E01FC33649311BFA62927B57CC95A72A75FB29379730C229F538851F0EF114E017654
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,00185686,00193CD6,?,00000000,?,00185B6A,?,?,?,?,?,0017E6D1,?,00218A48), ref: 00182D78
                                                          • _free.LIBCMT ref: 00182DAB
                                                          • _free.LIBCMT ref: 00182DD3
                                                          • SetLastError.KERNEL32(00000000,?,?,?,?,0017E6D1,?,00218A48,00000010,00154F4A,?,?,00000000,00193CD6), ref: 00182DE0
                                                          • SetLastError.KERNEL32(00000000,?,?,?,?,0017E6D1,?,00218A48,00000010,00154F4A,?,?,00000000,00193CD6), ref: 00182DEC
                                                          • _abort.LIBCMT ref: 00182DF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free$_abort
                                                          • String ID:
                                                          • API String ID: 3160817290-0
                                                          • Opcode ID: 732914827ea0b020e70616f0097c1712b017bfc59f0676c7a5c677014eec9bed
                                                          • Instruction ID: 06ce1f5bb1f56df62892971ed08033989545e869672a7a90e9e54b7da99d5976
                                                          • Opcode Fuzzy Hash: 732914827ea0b020e70616f0097c1712b017bfc59f0676c7a5c677014eec9bed
                                                          • Instruction Fuzzy Hash: 79F0C83664561037C61337B8BC0AE5F295ABFE27A1F254618F824972D2EF349B425F60
                                                          APIs
                                                            • Part of subcall function 00169639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00169693
                                                            • Part of subcall function 00169639: SelectObject.GDI32(?,00000000), ref: 001696A2
                                                            • Part of subcall function 00169639: BeginPath.GDI32(?), ref: 001696B9
                                                            • Part of subcall function 00169639: SelectObject.GDI32(?,00000000), ref: 001696E2
                                                          • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 001E8A4E
                                                          • LineTo.GDI32(?,00000003,00000000), ref: 001E8A62
                                                          • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 001E8A70
                                                          • LineTo.GDI32(?,00000000,00000003), ref: 001E8A80
                                                          • EndPath.GDI32(?), ref: 001E8A90
                                                          • StrokePath.GDI32(?), ref: 001E8AA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                          • String ID:
                                                          • API String ID: 43455801-0
                                                          • Opcode ID: 5af7783120f87bfc5e09a2d44b479914eb499d7e4c244e4242c019e68754f018
                                                          • Instruction ID: eeb7f5a6344fb4375fe8bca76424d5e19332916df040813432f6a0332e282022
                                                          • Opcode Fuzzy Hash: 5af7783120f87bfc5e09a2d44b479914eb499d7e4c244e4242c019e68754f018
                                                          • Instruction Fuzzy Hash: 6B11FA7600018CFFDF129F90DC88E9A7F6CEB04354F048021FA199A161C7719D96DFA0
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 001B5218
                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 001B5229
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 001B5230
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 001B5238
                                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 001B524F
                                                          • MulDiv.KERNEL32(000009EC,00000001,?), ref: 001B5261
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDevice$Release
                                                          • String ID:
                                                          • API String ID: 1035833867-0
                                                          • Opcode ID: e510246554c4b1418858a633d4e769a26d89ed7a70a0326823cd3c7e72d21dcf
                                                          • Instruction ID: a92306d1311c1b2ddf1f1949c95f44c5d1bd7ad9d0cfa792bbf260d037287369
                                                          • Opcode Fuzzy Hash: e510246554c4b1418858a633d4e769a26d89ed7a70a0326823cd3c7e72d21dcf
                                                          • Instruction Fuzzy Hash: 56014F75A01758BBEB109BE59C89B5EBFB9EB48751F044065FA04AB681D7709801CBA0
                                                          APIs
                                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00151BF4
                                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00151BFC
                                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00151C07
                                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00151C12
                                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00151C1A
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00151C22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Virtual
                                                          • String ID:
                                                          • API String ID: 4278518827-0
                                                          • Opcode ID: 444314952d53945dd294172417cb2fb18c8b4022d8512ac8f28cdbf4b0f084c4
                                                          • Instruction ID: 9449716f2269e0a604b0a56bf2ae3351ee80d5c4276e1efa883046dac3c74053
                                                          • Opcode Fuzzy Hash: 444314952d53945dd294172417cb2fb18c8b4022d8512ac8f28cdbf4b0f084c4
                                                          • Instruction Fuzzy Hash: 950148B09027597DE3008F5A8C85A56FFA8FF19354F04411B915C4BA41C7B5A864CBE5
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 001BEB30
                                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 001BEB46
                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 001BEB55
                                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 001BEB64
                                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 001BEB6E
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 001BEB75
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 839392675-0
                                                          • Opcode ID: 90f1e167e3778356be1f20d07af77b06a633e7c8ffac300ac057b837ddc04efc
                                                          • Instruction ID: 03cee1823f82090a5c5afe3b0c74c039e346dcc77282acf413ae6adfe08b9561
                                                          • Opcode Fuzzy Hash: 90f1e167e3778356be1f20d07af77b06a633e7c8ffac300ac057b837ddc04efc
                                                          • Instruction Fuzzy Hash: E9F03072140198BBE72157929C4DEEF3A7CEFCAB11F000158FA01D5591D7A05A42C6F5
                                                          APIs
                                                          • GetClientRect.USER32(?), ref: 001A7452
                                                          • SendMessageW.USER32(?,00001328,00000000,?), ref: 001A7469
                                                          • GetWindowDC.USER32(?), ref: 001A7475
                                                          • GetPixel.GDI32(00000000,?,?), ref: 001A7484
                                                          • ReleaseDC.USER32(?,00000000), ref: 001A7496
                                                          • GetSysColor.USER32(00000005), ref: 001A74B0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                          • String ID:
                                                          • API String ID: 272304278-0
                                                          • Opcode ID: 1dd899051d4d56dabb49643fdd02a47a7a83219362e87867ca21e9a0695880b8
                                                          • Instruction ID: 21c2492fb191562cf68c09642062bb26093381affaf7d2154fb6c6b33d76eeba
                                                          • Opcode Fuzzy Hash: 1dd899051d4d56dabb49643fdd02a47a7a83219362e87867ca21e9a0695880b8
                                                          • Instruction Fuzzy Hash: 9B018B31500255EFDB105FA4DC48BEEBBB6FF48311F110064F926A65A0CB311E92AB90
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 001B187F
                                                          • UnloadUserProfile.USERENV(?,?), ref: 001B188B
                                                          • CloseHandle.KERNEL32(?), ref: 001B1894
                                                          • CloseHandle.KERNEL32(?), ref: 001B189C
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 001B18A5
                                                          • HeapFree.KERNEL32(00000000), ref: 001B18AC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                          • String ID:
                                                          • API String ID: 146765662-0
                                                          • Opcode ID: ec06589542ab737535113294c191bfa64577150a24cffe8e71841a4fb023e7e6
                                                          • Instruction ID: be25b518466eaa1fdf5bf89df514c9f5f956db2d9e383008f828890ecafd2c38
                                                          • Opcode Fuzzy Hash: ec06589542ab737535113294c191bfa64577150a24cffe8e71841a4fb023e7e6
                                                          • Instruction Fuzzy Hash: 14E0E536004241FBDB015FE1ED4C90EBF39FF4AB22B108220F62589870CB3294A2DF90
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 0015BEB3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID: D%"$D%"$D%"$D%"D%"
                                                          • API String ID: 1385522511-2824579510
                                                          • Opcode ID: adda9341f65259f804ef7e67853dc30e166aad948748640bf68615323035af01
                                                          • Instruction ID: 25f4e7b776448bdbb4891d8ed75c567522f66192cd249da84d1df6a27f3a6db5
                                                          • Opcode Fuzzy Hash: adda9341f65259f804ef7e67853dc30e166aad948748640bf68615323035af01
                                                          • Instruction Fuzzy Hash: 85916A75A0820ADFCB18CF98C0D16A9B7F1FF58315F248169E965AB350E731ED89CB90
                                                          APIs
                                                            • Part of subcall function 00157620: _wcslen.LIBCMT ref: 00157625
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 001BC6EE
                                                          • _wcslen.LIBCMT ref: 001BC735
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 001BC79C
                                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 001BC7CA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info_wcslen$Default
                                                          • String ID: 0
                                                          • API String ID: 1227352736-4108050209
                                                          • Opcode ID: e27c1fc924828078d3c980864bb09c58faacf82ca5f61302ee9e48bcd49f3f16
                                                          • Instruction ID: ce6e03d37aafc10d1c07db169108cfe29392bfab8b7c8360c9daa3319b160de5
                                                          • Opcode Fuzzy Hash: e27c1fc924828078d3c980864bb09c58faacf82ca5f61302ee9e48bcd49f3f16
                                                          • Instruction Fuzzy Hash: 6251FF726043019BD714DF68C885BEBB7E8AFA9310F040A2DF9A5D72A0DB70D814CBD2
                                                          APIs
                                                          • ShellExecuteExW.SHELL32(0000003C), ref: 001DAEA3
                                                            • Part of subcall function 00157620: _wcslen.LIBCMT ref: 00157625
                                                          • GetProcessId.KERNEL32(00000000), ref: 001DAF38
                                                          • CloseHandle.KERNEL32(00000000), ref: 001DAF67
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseExecuteHandleProcessShell_wcslen
                                                          • String ID: <$@
                                                          • API String ID: 146682121-1426351568
                                                          • Opcode ID: 4c3b222d6c60d4d78c0bcefaa976f48587f84fa86f0505dbbd3ab6d0ca595b28
                                                          • Instruction ID: d979d4b7092b142707d0d6f89055401a653f01793b977740b9181b5ea0f54bc4
                                                          • Opcode Fuzzy Hash: 4c3b222d6c60d4d78c0bcefaa976f48587f84fa86f0505dbbd3ab6d0ca595b28
                                                          • Instruction Fuzzy Hash: 6F717771A00618DFCB14DFA4D485A9EBBF0BF08301F44849AE866AF392D770ED45CB91
                                                          APIs
                                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 001B7206
                                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 001B723C
                                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 001B724D
                                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 001B72CF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                                          • String ID: DllGetClassObject
                                                          • API String ID: 753597075-1075368562
                                                          • Opcode ID: 78e58e9e41c1ba3d7ab008f865c23814530678ffc25eec974ab7e97eae850844
                                                          • Instruction ID: f7efbdecb95adbb24db153f526c3ba531b84d2f0095e49ae899cdcdc5970d26a
                                                          • Opcode Fuzzy Hash: 78e58e9e41c1ba3d7ab008f865c23814530678ffc25eec974ab7e97eae850844
                                                          • Instruction Fuzzy Hash: 0C413171A04204EFDB15CF94C984ADA7BA9EF98310F1580ADFD05DF28AD7B1DA45CBA0
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 001E3E35
                                                          • IsMenu.USER32(?), ref: 001E3E4A
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 001E3E92
                                                          • DrawMenuBar.USER32 ref: 001E3EA5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$DrawInfoInsert
                                                          • String ID: 0
                                                          • API String ID: 3076010158-4108050209
                                                          • Opcode ID: d8a12d2934cb9476736179d6a3e49271f5256e0f7e6f5699a9aecdedce7f236e
                                                          • Instruction ID: 22d57d3796b875e35a2fbaee2e2503188e99102955be85117e2f42da572caa05
                                                          • Opcode Fuzzy Hash: d8a12d2934cb9476736179d6a3e49271f5256e0f7e6f5699a9aecdedce7f236e
                                                          • Instruction Fuzzy Hash: 1C418A74A00649EFDB14DF91D888EAEBBB5FF48350F044129F825AB250D330AE42CF90
                                                          APIs
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                            • Part of subcall function 001B3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 001B3CCA
                                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 001B1E66
                                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 001B1E79
                                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 001B1EA9
                                                            • Part of subcall function 00156B57: _wcslen.LIBCMT ref: 00156B6A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_wcslen$ClassName
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 2081771294-1403004172
                                                          • Opcode ID: 6249bd73941faf86893cf3fb99e1a02e5c5e75deab5dcedbf27ed131c44b4ba1
                                                          • Instruction ID: 049a35a52cbbd5588a56f9212f69565ce58bee781df664f6186c34d139814ff1
                                                          • Opcode Fuzzy Hash: 6249bd73941faf86893cf3fb99e1a02e5c5e75deab5dcedbf27ed131c44b4ba1
                                                          • Instruction Fuzzy Hash: DD218B71A00104FEDB049BA4DC95CFFBBB8DF66350B954019FC21AB1E1DB34890A8660
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                          • API String ID: 176396367-4004644295
                                                          • Opcode ID: 27fc46ba6fb8a7f48fc0d4d02aab15a0a8ece011215031036b1428d6501eecd1
                                                          • Instruction ID: 5f135a7f760bd5fe5267a9102ef60e1fd3ce509823afd09426383623b947191c
                                                          • Opcode Fuzzy Hash: 27fc46ba6fb8a7f48fc0d4d02aab15a0a8ece011215031036b1428d6501eecd1
                                                          • Instruction Fuzzy Hash: F731D273A1016B8BCB20DE6C99405BE33A29BB1794B15492BF855AB345FB71CE84D3E0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 001E2F8D
                                                          • LoadLibraryW.KERNEL32(?), ref: 001E2F94
                                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 001E2FA9
                                                          • DestroyWindow.USER32(?), ref: 001E2FB1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyLibraryLoadWindow
                                                          • String ID: SysAnimate32
                                                          • API String ID: 3529120543-1011021900
                                                          • Opcode ID: 0f189231cb64986254bb52c54fba3cc42cb69864f476434765eacebaa4d637ab
                                                          • Instruction ID: 220eab493e316ff1c9be479fe09a3f774dc70ef901ddde7ff06ab4797fb5cb11
                                                          • Opcode Fuzzy Hash: 0f189231cb64986254bb52c54fba3cc42cb69864f476434765eacebaa4d637ab
                                                          • Instruction Fuzzy Hash: 0E21CD72600685ABEB204FA6DCA1FBF77BDEB69364F100228FA50D7190D771DC9197A0
                                                          APIs
                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00174D1E,001828E9,?,00174CBE,001828E9,002188B8,0000000C,00174E15,001828E9,00000002), ref: 00174D8D
                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00174DA0
                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,00174D1E,001828E9,?,00174CBE,001828E9,002188B8,0000000C,00174E15,001828E9,00000002,00000000), ref: 00174DC3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                          • String ID: CorExitProcess$mscoree.dll
                                                          • API String ID: 4061214504-1276376045
                                                          • Opcode ID: 073e18a6e9af43fd527c4f976406648d54d2c504603394560a2b8660a0ccaf5e
                                                          • Instruction ID: 42286adc43b6447e5a1c4ceec0a82dc098da173af7116daf8408f076b1ae984d
                                                          • Opcode Fuzzy Hash: 073e18a6e9af43fd527c4f976406648d54d2c504603394560a2b8660a0ccaf5e
                                                          • Instruction Fuzzy Hash: F3F04F35A40308FBDB129FD4DC49BEDBBB5EF58752F0441A8F949A6660DB309A81CAD0
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00154EDD,?,00221418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00154E9C
                                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00154EAE
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00154EDD,?,00221418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00154EC0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                          • API String ID: 145871493-3689287502
                                                          • Opcode ID: 1a6024698cd0fe5148168b84e6f8a5dfd18af3e8c7689f190f5cfefc9d67495a
                                                          • Instruction ID: be3d013bd8dfdbdf47974ead1180368ea9011aa367aadbbc6be0b0770b288f19
                                                          • Opcode Fuzzy Hash: 1a6024698cd0fe5148168b84e6f8a5dfd18af3e8c7689f190f5cfefc9d67495a
                                                          • Instruction Fuzzy Hash: 4FE0CD35E01622DBD2311765AC1DB9F6595EF82F677090115FC10DB100DB74CD8744F4
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00193CDE,?,00221418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00154E62
                                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00154E74
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00193CDE,?,00221418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00154E87
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                          • API String ID: 145871493-1355242751
                                                          • Opcode ID: 832668110094dc01b2eabea40d258678c640547807e14ce180f749cbe5bca192
                                                          • Instruction ID: b7639192e3c66d02ee714366046c33bc27093985dbd3e6533818d3e8189d924e
                                                          • Opcode Fuzzy Hash: 832668110094dc01b2eabea40d258678c640547807e14ce180f749cbe5bca192
                                                          • Instruction Fuzzy Hash: A5D0C231902A61E7A6221B256C09DCF2A18EF85F563090114BC10AA110CF34CD8285D0
                                                          APIs
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 001C2C05
                                                          • DeleteFileW.KERNEL32(?), ref: 001C2C87
                                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 001C2C9D
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 001C2CAE
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 001C2CC0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: File$Delete$Copy
                                                          • String ID:
                                                          • API String ID: 3226157194-0
                                                          • Opcode ID: ae190ce48830e2ed874799ac27b081a834222fb516a7dd5b191b3003b5e3f892
                                                          • Instruction ID: 4615b53e8d2ec19ea7ace31d2033b3696d09487e5d0c7df43563d4651fcfb31f
                                                          • Opcode Fuzzy Hash: ae190ce48830e2ed874799ac27b081a834222fb516a7dd5b191b3003b5e3f892
                                                          • Instruction Fuzzy Hash: 35B13E71900119ABDF25DBA4CC85FDEB7BDEF69350F1040AAF909A7141EB30DA448B61
                                                          APIs
                                                          • GetCurrentProcessId.KERNEL32 ref: 001DA427
                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 001DA435
                                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 001DA468
                                                          • CloseHandle.KERNEL32(?), ref: 001DA63D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseCountersCurrentHandleOpen
                                                          • String ID:
                                                          • API String ID: 3488606520-0
                                                          • Opcode ID: f43d970dd46c7b9cccfa8862d3ac88050b9e8cf3c76993083068f06eea1ff8c2
                                                          • Instruction ID: d81b1adf4ea3605746f018c4429fd4f90e5c0d04b8711bf956d938dc5d1db309
                                                          • Opcode Fuzzy Hash: f43d970dd46c7b9cccfa8862d3ac88050b9e8cf3c76993083068f06eea1ff8c2
                                                          • Instruction Fuzzy Hash: 11A1A1716043009FD720DF28D886F2AB7E5AF94714F54885DF96A9B392DBB0EC45CB82
                                                          APIs
                                                            • Part of subcall function 001BDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,001BCF22,?), ref: 001BDDFD
                                                            • Part of subcall function 001BDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,001BCF22,?), ref: 001BDE16
                                                            • Part of subcall function 001BE199: GetFileAttributesW.KERNEL32(?,001BCF95), ref: 001BE19A
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 001BE473
                                                          • MoveFileW.KERNEL32(?,?), ref: 001BE4AC
                                                          • _wcslen.LIBCMT ref: 001BE5EB
                                                          • _wcslen.LIBCMT ref: 001BE603
                                                          • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 001BE650
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                          • String ID:
                                                          • API String ID: 3183298772-0
                                                          • Opcode ID: e9f1f7f81ed2d22c12e80ecce6dd7347809beb3ab4a770d954dd7ea69db08126
                                                          • Instruction ID: e4e14eb6f10e32388944786fbd4b372fe7c38388edb07f83c299f04b5d9b5507
                                                          • Opcode Fuzzy Hash: e9f1f7f81ed2d22c12e80ecce6dd7347809beb3ab4a770d954dd7ea69db08126
                                                          • Instruction Fuzzy Hash: 5E5153B24083859BC724DBA4DC819DF73ECAF95340F00492EF689D7191EF75A68C8766
                                                          APIs
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                            • Part of subcall function 001DC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,001DB6AE,?,?), ref: 001DC9B5
                                                            • Part of subcall function 001DC998: _wcslen.LIBCMT ref: 001DC9F1
                                                            • Part of subcall function 001DC998: _wcslen.LIBCMT ref: 001DCA68
                                                            • Part of subcall function 001DC998: _wcslen.LIBCMT ref: 001DCA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001DBAA5
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 001DBB00
                                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 001DBB63
                                                          • RegCloseKey.ADVAPI32(?,?), ref: 001DBBA6
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 001DBBB3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                          • String ID:
                                                          • API String ID: 826366716-0
                                                          • Opcode ID: 657680c8d6d806752cbe68fd602fd7a1dd4213e762a873070bc820da0ce8ae33
                                                          • Instruction ID: 794fa9a652abc7f52174d00c4422fd1d865f7f802576022efa2c4b45f9ce44a3
                                                          • Opcode Fuzzy Hash: 657680c8d6d806752cbe68fd602fd7a1dd4213e762a873070bc820da0ce8ae33
                                                          • Instruction Fuzzy Hash: B2612A31208241EFD714DF54C8D1E2ABBE5BF84308F55895EF49A8B2A2DB31ED45CB92
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 001B8BCD
                                                          • VariantClear.OLEAUT32 ref: 001B8C3E
                                                          • VariantClear.OLEAUT32 ref: 001B8C9D
                                                          • VariantClear.OLEAUT32(?), ref: 001B8D10
                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 001B8D3B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$ChangeInitType
                                                          • String ID:
                                                          • API String ID: 4136290138-0
                                                          • Opcode ID: f007cf2f633de0a7c347d8c86cdebb41ad97e14fcdd33fdb89f0eae85f3bf2ca
                                                          • Instruction ID: 5d89eaa1567797e7967c3384e7f7852d5be5ffef6afd645e0db0477f1390e12d
                                                          • Opcode Fuzzy Hash: f007cf2f633de0a7c347d8c86cdebb41ad97e14fcdd33fdb89f0eae85f3bf2ca
                                                          • Instruction Fuzzy Hash: F6516AB5A00219EFCB14CF68C894AEAB7F8FF8D710B15855AE909DB350E730E911CB90
                                                          APIs
                                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 001C8BAE
                                                          • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 001C8BDA
                                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 001C8C32
                                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 001C8C57
                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 001C8C5F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfile$SectionWrite$String
                                                          • String ID:
                                                          • API String ID: 2832842796-0
                                                          • Opcode ID: ed09fd88a96d02a45e1fa77c92dd10c8ee91ea5e02adc7def147bab61f591f25
                                                          • Instruction ID: 2780e3c34c26c0cf3772a560e3aedfe3f933597bdbdd8a201400bd3eba70c0ca
                                                          • Opcode Fuzzy Hash: ed09fd88a96d02a45e1fa77c92dd10c8ee91ea5e02adc7def147bab61f591f25
                                                          • Instruction Fuzzy Hash: 70513835A00215DFCB04DF64D881EADBBF5BF58314F088458E859AB3A2DB31ED55CB90
                                                          APIs
                                                          • LoadLibraryW.KERNEL32(?,00000000,?), ref: 001D8F40
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 001D8FD0
                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 001D8FEC
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 001D9032
                                                          • FreeLibrary.KERNEL32(00000000), ref: 001D9052
                                                            • Part of subcall function 0016F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,001C1043,?,753CE610), ref: 0016F6E6
                                                            • Part of subcall function 0016F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,001AFA64,00000000,00000000,?,?,001C1043,?,753CE610,?,001AFA64), ref: 0016F70D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                          • String ID:
                                                          • API String ID: 666041331-0
                                                          • Opcode ID: 1bcb264de524da8c68fd97e4c9c86c691c9a87ff137934c8bbd553fb17d63559
                                                          • Instruction ID: 55dbca4feff6290d00a17cd06bc149cb10f36b5ead40adc4df62f888b0303c59
                                                          • Opcode Fuzzy Hash: 1bcb264de524da8c68fd97e4c9c86c691c9a87ff137934c8bbd553fb17d63559
                                                          • Instruction Fuzzy Hash: 6F515C35604205DFCB15EF68D4848ADBBF1FF59314B0580A9E81A9F362DB31ED8ACB91
                                                          APIs
                                                          • SetWindowLongW.USER32(00000002,000000F0,?), ref: 001E6C33
                                                          • SetWindowLongW.USER32(?,000000EC,?), ref: 001E6C4A
                                                          • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 001E6C73
                                                          • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,001CAB79,00000000,00000000), ref: 001E6C98
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 001E6CC7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$MessageSendShow
                                                          • String ID:
                                                          • API String ID: 3688381893-0
                                                          • Opcode ID: 9a7d9f05e04da60fdc43c99a4b5471cb8341ddb7ae7ae70d8a2750c2954d00bf
                                                          • Instruction ID: 8bde7ba1e71ddbf6e67be9aae008adb3258c26e98a2492320cafce4b546be42b
                                                          • Opcode Fuzzy Hash: 9a7d9f05e04da60fdc43c99a4b5471cb8341ddb7ae7ae70d8a2750c2954d00bf
                                                          • Instruction Fuzzy Hash: 8741F735600584AFD724CF6ACC98FAD7BA5EB19390F650228FC99A73E0C371ED41CA80
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: 63a239796ca843c4b27a952fbeee5dd19c71b93c954a33a1c89f9c7b6852653a
                                                          • Instruction ID: 70b838e9fca00b8ca448654e9b1d255c0162866eaf89ada6b0eb898f84553216
                                                          • Opcode Fuzzy Hash: 63a239796ca843c4b27a952fbeee5dd19c71b93c954a33a1c89f9c7b6852653a
                                                          • Instruction Fuzzy Hash: BB41D376A002009FCB25EF78C885A9DB7F5EF99314F268569E515EB391DB31EE01CB80
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00169141
                                                          • ScreenToClient.USER32(00000000,?), ref: 0016915E
                                                          • GetAsyncKeyState.USER32(00000001), ref: 00169183
                                                          • GetAsyncKeyState.USER32(00000002), ref: 0016919D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: AsyncState$ClientCursorScreen
                                                          • String ID:
                                                          • API String ID: 4210589936-0
                                                          • Opcode ID: 9f756a24147d76ac289acef590693bb1f4f4333c7f1c6cb7949cb0da69e48891
                                                          • Instruction ID: c32a2d5036ef5c5d77177310a138939da6bd5106d9c9cecd2e6a31c48aa97bb3
                                                          • Opcode Fuzzy Hash: 9f756a24147d76ac289acef590693bb1f4f4333c7f1c6cb7949cb0da69e48891
                                                          • Instruction Fuzzy Hash: 2B415E75A0864AEBDF199F68CC44BEEB7B8FF06330F248215E425A72D0C7346A54CB91
                                                          APIs
                                                          • GetInputState.USER32 ref: 001C38CB
                                                          • TranslateAcceleratorW.USER32(?,00000000,?), ref: 001C3922
                                                          • TranslateMessage.USER32(?), ref: 001C394B
                                                          • DispatchMessageW.USER32(?), ref: 001C3955
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 001C3966
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                          • String ID:
                                                          • API String ID: 2256411358-0
                                                          • Opcode ID: 104c46737bd892c78bc9a54177bc9779ed329bcccbc24e76a682f429c596af81
                                                          • Instruction ID: de07da64279ef1423df1163ddd52559559d8c7e2f1c386c9d47191b31e3a7bcf
                                                          • Opcode Fuzzy Hash: 104c46737bd892c78bc9a54177bc9779ed329bcccbc24e76a682f429c596af81
                                                          • Instruction Fuzzy Hash: 7731B970904381AEEB35CBB4AC4DFB677A4AB35308F04856DE472865A0D3F5D686CB51
                                                          APIs
                                                          • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,001CC21E,00000000), ref: 001CCF38
                                                          • InternetReadFile.WININET(?,00000000,?,?), ref: 001CCF6F
                                                          • GetLastError.KERNEL32(?,00000000,?,?,?,001CC21E,00000000), ref: 001CCFB4
                                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,001CC21E,00000000), ref: 001CCFC8
                                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,001CC21E,00000000), ref: 001CCFF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                          • String ID:
                                                          • API String ID: 3191363074-0
                                                          • Opcode ID: 4bb4ba25f0acecce699c0f44626891e9ba85824c3d35a95482f2d6a41ade4ed5
                                                          • Instruction ID: 4c06c71d1c9792f0457488f15fef66c0b22df8b005b0fb17a822d8f05329ce31
                                                          • Opcode Fuzzy Hash: 4bb4ba25f0acecce699c0f44626891e9ba85824c3d35a95482f2d6a41ade4ed5
                                                          • Instruction Fuzzy Hash: 5C314B71900205AFDB24DFA5D884EAEBBF9EB24350B10442EF51AD6540DB30EE41DBA0
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 001B1915
                                                          • PostMessageW.USER32(00000001,00000201,00000001), ref: 001B19C1
                                                          • Sleep.KERNEL32(00000000,?,?,?), ref: 001B19C9
                                                          • PostMessageW.USER32(00000001,00000202,00000000), ref: 001B19DA
                                                          • Sleep.KERNEL32(00000000,?,?,?,?), ref: 001B19E2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleep$RectWindow
                                                          • String ID:
                                                          • API String ID: 3382505437-0
                                                          • Opcode ID: dac19da16d6f1bf9f99bf966ab993ad51d96ebde6e24deb9460be94268ee72a9
                                                          • Instruction ID: 00f8b5812e3b08875a98a42a7f0d70d1515674c032fa034aed988536738ffd84
                                                          • Opcode Fuzzy Hash: dac19da16d6f1bf9f99bf966ab993ad51d96ebde6e24deb9460be94268ee72a9
                                                          • Instruction Fuzzy Hash: 6A31C072A00259FFCB04CFA8CDA9ADE3BB5EB05319F514229F921EB2D1C7709944CB90
                                                          APIs
                                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 001E5745
                                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 001E579D
                                                          • _wcslen.LIBCMT ref: 001E57AF
                                                          • _wcslen.LIBCMT ref: 001E57BA
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 001E5816
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_wcslen
                                                          • String ID:
                                                          • API String ID: 763830540-0
                                                          • Opcode ID: 483fbff1a91d98e8a25715c84f16fb7f69900c74e6250a69d474c852f9994732
                                                          • Instruction ID: eb62fbbe09eb0fbf4546a175201c600512fb0a6b3e4760f3f22ee9e8a4d0a58c
                                                          • Opcode Fuzzy Hash: 483fbff1a91d98e8a25715c84f16fb7f69900c74e6250a69d474c852f9994732
                                                          • Instruction Fuzzy Hash: 8021A531D04A989ADB208FA1CC84AEE7BB9FF14328F148216E919EB1C1E7708985CF50
                                                          APIs
                                                          • IsWindow.USER32(00000000), ref: 001D0951
                                                          • GetForegroundWindow.USER32 ref: 001D0968
                                                          • GetDC.USER32(00000000), ref: 001D09A4
                                                          • GetPixel.GDI32(00000000,?,00000003), ref: 001D09B0
                                                          • ReleaseDC.USER32(00000000,00000003), ref: 001D09E8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ForegroundPixelRelease
                                                          • String ID:
                                                          • API String ID: 4156661090-0
                                                          • Opcode ID: 5e5597632bce9635dd8546a505fe3e8fab7f1da0714272e41b1629c03a08f3ef
                                                          • Instruction ID: a79f7cd2c16cf434429be110859946a4f6b2228885591f96f115cf7f3228d353
                                                          • Opcode Fuzzy Hash: 5e5597632bce9635dd8546a505fe3e8fab7f1da0714272e41b1629c03a08f3ef
                                                          • Instruction Fuzzy Hash: 7A216F35600204AFD704EFA9DC94AAEBBE5FF58701F04846DE85ADB752DB70AC45CB90
                                                          APIs
                                                          • GetEnvironmentStringsW.KERNEL32 ref: 0018CDC6
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0018CDE9
                                                            • Part of subcall function 00183820: RtlAllocateHeap.NTDLL(00000000,?,00221444,?,0016FDF5,?,?,0015A976,00000010,00221440,001513FC,?,001513C6,?,00151129), ref: 00183852
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0018CE0F
                                                          • _free.LIBCMT ref: 0018CE22
                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0018CE31
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                          • String ID:
                                                          • API String ID: 336800556-0
                                                          • Opcode ID: f4b2845e8363dc79ed137dc846a2b53a77e1cc5a9c44b2e77522147284e53798
                                                          • Instruction ID: e958602a2ae63b4e5817c00d4e1eae09f62383bd76fd0888ea4d19a03a944981
                                                          • Opcode Fuzzy Hash: f4b2845e8363dc79ed137dc846a2b53a77e1cc5a9c44b2e77522147284e53798
                                                          • Instruction Fuzzy Hash: D40184726016557F232136BA6C88D7F6E6DEFC6BA13154129F905C7201EB718F028BF0
                                                          APIs
                                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00169693
                                                          • SelectObject.GDI32(?,00000000), ref: 001696A2
                                                          • BeginPath.GDI32(?), ref: 001696B9
                                                          • SelectObject.GDI32(?,00000000), ref: 001696E2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: 5169f6e42dfb5c5c2bc93393e032814e41d3b6068bffa3a63fa961d53a09697d
                                                          • Instruction ID: e44c796555f198626d25065c5465cccc452d12356bef9d7c3f5710b95ac31fdf
                                                          • Opcode Fuzzy Hash: 5169f6e42dfb5c5c2bc93393e032814e41d3b6068bffa3a63fa961d53a09697d
                                                          • Instruction Fuzzy Hash: F9214CB0802385EBDB219FA4EC58BAD3BA9BF61755F10061AF410A61B0D37099F3CF94
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 3a57c3e1db3537d09648e8c684d3ce9d96f5964333bab13e0d5b8ee069afe72a
                                                          • Instruction ID: 3e744240950d7f23664eb20e4685a98fd9e3055b593b1d9a5091baeb7cab6983
                                                          • Opcode Fuzzy Hash: 3a57c3e1db3537d09648e8c684d3ce9d96f5964333bab13e0d5b8ee069afe72a
                                                          • Instruction Fuzzy Hash: 0F017971741A05BBE30857159D82FFF736FAB713A8FA44025FD089B641FB61EE1282A1
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,?,0017F2DE,00183863,00221444,?,0016FDF5,?,?,0015A976,00000010,00221440,001513FC,?,001513C6), ref: 00182DFD
                                                          • _free.LIBCMT ref: 00182E32
                                                          • _free.LIBCMT ref: 00182E59
                                                          • SetLastError.KERNEL32(00000000,00151129), ref: 00182E66
                                                          • SetLastError.KERNEL32(00000000,00151129), ref: 00182E6F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free
                                                          • String ID:
                                                          • API String ID: 3170660625-0
                                                          • Opcode ID: bf65d64b554494f2a9de40a0d988fbf98899517144fcb6ad5a623077a1ae846c
                                                          • Instruction ID: b74181cce1624f5f65229d36570dc6011b31d137c78fe4e5194cb2eb77382830
                                                          • Opcode Fuzzy Hash: bf65d64b554494f2a9de40a0d988fbf98899517144fcb6ad5a623077a1ae846c
                                                          • Instruction Fuzzy Hash: D3012836645A007BC62377747C89D6F265EABE17B5B364028F825A32D2EF348F014F64
                                                          APIs
                                                          • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,001AFF41,80070057,?,?,?,001B035E), ref: 001B002B
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,001AFF41,80070057,?,?), ref: 001B0046
                                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,001AFF41,80070057,?,?), ref: 001B0054
                                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,001AFF41,80070057,?), ref: 001B0064
                                                          • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,001AFF41,80070057,?,?), ref: 001B0070
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                                          • String ID:
                                                          • API String ID: 3897988419-0
                                                          • Opcode ID: c10d0cd7b368cf0e37a33ae62399fbd4a67cc09aadead78c4f029ad64945c1b7
                                                          • Instruction ID: 5e82318942e018037074c7c26c7a91e17c5eb2299172f563645bd6342c1c84dc
                                                          • Opcode Fuzzy Hash: c10d0cd7b368cf0e37a33ae62399fbd4a67cc09aadead78c4f029ad64945c1b7
                                                          • Instruction Fuzzy Hash: CA018F72600204BFDB125FA8DC44FEF7AADEB48791F144128F905D6210D771DD818BA0
                                                          APIs
                                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 001B1114
                                                          • GetLastError.KERNEL32(?,00000000,00000000,?,?,001B0B9B,?,?,?), ref: 001B1120
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,001B0B9B,?,?,?), ref: 001B112F
                                                          • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,001B0B9B,?,?,?), ref: 001B1136
                                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 001B114D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 842720411-0
                                                          • Opcode ID: f76494255bdeda662568a3f15695662905a798cffad94144f2a9fcc165262753
                                                          • Instruction ID: 465eebd2543eb461139ff385fef29d4f5b5d0c48c1df7439c1ab3acb9955c346
                                                          • Opcode Fuzzy Hash: f76494255bdeda662568a3f15695662905a798cffad94144f2a9fcc165262753
                                                          • Instruction Fuzzy Hash: FB018179500205BFDB114FA8DC89EAE3F6EEF86360B150418FA41C7350DB31DC418BA0
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 001B0FCA
                                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 001B0FD6
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 001B0FE5
                                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 001B0FEC
                                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 001B1002
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: f2ce5e3445e4cb6bb67e75d652101ae0854e26ba7e2259fe31d57c8f6447a040
                                                          • Instruction ID: 599e9936f87d08dfc6ea5be66b7b6e55289394f4995e8dd25743e20eae4b6c2e
                                                          • Opcode Fuzzy Hash: f2ce5e3445e4cb6bb67e75d652101ae0854e26ba7e2259fe31d57c8f6447a040
                                                          • Instruction Fuzzy Hash: C1F04939200345FBDB215FA49C8DF9A3BADEF8A762F614415FE45CA651CB70DC818BA0
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 001B102A
                                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 001B1036
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 001B1045
                                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 001B104C
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 001B1062
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 56869306bf8377c448402fe25ccb47275ff7832e29634f1e5da809ec873a3120
                                                          • Instruction ID: cdb0f7641aa69fefaf5f8958020618415bc2e9da5b5d7ae4a01c25d16c6d56bd
                                                          • Opcode Fuzzy Hash: 56869306bf8377c448402fe25ccb47275ff7832e29634f1e5da809ec873a3120
                                                          • Instruction Fuzzy Hash: 61F04F39100341FBD7215FA4EC99F9A3B6DEF8A761F610414FD45CA650CB70D8818AA0
                                                          APIs
                                                          • CloseHandle.KERNEL32(?,?,?,?,001C017D,?,001C32FC,?,00000001,00192592,?), ref: 001C0324
                                                          • CloseHandle.KERNEL32(?,?,?,?,001C017D,?,001C32FC,?,00000001,00192592,?), ref: 001C0331
                                                          • CloseHandle.KERNEL32(?,?,?,?,001C017D,?,001C32FC,?,00000001,00192592,?), ref: 001C033E
                                                          • CloseHandle.KERNEL32(?,?,?,?,001C017D,?,001C32FC,?,00000001,00192592,?), ref: 001C034B
                                                          • CloseHandle.KERNEL32(?,?,?,?,001C017D,?,001C32FC,?,00000001,00192592,?), ref: 001C0358
                                                          • CloseHandle.KERNEL32(?,?,?,?,001C017D,?,001C32FC,?,00000001,00192592,?), ref: 001C0365
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle
                                                          • String ID:
                                                          • API String ID: 2962429428-0
                                                          • Opcode ID: fdc14175c91c69d7c468d612b0cadb219369c9fbd1fec103cba9190b497c596e
                                                          • Instruction ID: a38da16d7f258c06d9e74c4272991f74404e954a857839e5a82c99d01665fd7a
                                                          • Opcode Fuzzy Hash: fdc14175c91c69d7c468d612b0cadb219369c9fbd1fec103cba9190b497c596e
                                                          • Instruction Fuzzy Hash: FB01EE72800B81CFCB32AF66D880802FBF9BF603153059A3FD19252931C3B1A989CF80
                                                          APIs
                                                          • _free.LIBCMT ref: 0018D752
                                                            • Part of subcall function 001829C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0018D7D1,00000000,00000000,00000000,00000000,?,0018D7F8,00000000,00000007,00000000,?,0018DBF5,00000000), ref: 001829DE
                                                            • Part of subcall function 001829C8: GetLastError.KERNEL32(00000000,?,0018D7D1,00000000,00000000,00000000,00000000,?,0018D7F8,00000000,00000007,00000000,?,0018DBF5,00000000,00000000), ref: 001829F0
                                                          • _free.LIBCMT ref: 0018D764
                                                          • _free.LIBCMT ref: 0018D776
                                                          • _free.LIBCMT ref: 0018D788
                                                          • _free.LIBCMT ref: 0018D79A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 4983f00e7595060a01d7321fc2dc210ae95114eae5681df88db95a08c6e502d4
                                                          • Instruction ID: c65d8b95ff346c1a461134dce79e44d5ca6767d63c1cfe7225bc4c62264a7d1c
                                                          • Opcode Fuzzy Hash: 4983f00e7595060a01d7321fc2dc210ae95114eae5681df88db95a08c6e502d4
                                                          • Instruction Fuzzy Hash: 94F03632944314AB8622FB68F9C6C5677EDBB547187A64C05F048D7541CB34FD808F64
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 001B5C58
                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 001B5C6F
                                                          • MessageBeep.USER32(00000000), ref: 001B5C87
                                                          • KillTimer.USER32(?,0000040A), ref: 001B5CA3
                                                          • EndDialog.USER32(?,00000001), ref: 001B5CBD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                          • String ID:
                                                          • API String ID: 3741023627-0
                                                          • Opcode ID: 61c168d5ba03c7aaabecb895d54a4a86fcd26dc61b36cba3664dd5106a27d5e0
                                                          • Instruction ID: e3dcab7e899e61fb01312033fd6db4893d599fc4163af640aded9e4908bcc629
                                                          • Opcode Fuzzy Hash: 61c168d5ba03c7aaabecb895d54a4a86fcd26dc61b36cba3664dd5106a27d5e0
                                                          • Instruction Fuzzy Hash: 61018130500B44ABEB245B50DD8EFEA7BBEBB04B05F000559E583A55E1DBF0A9898BD0
                                                          APIs
                                                          • _free.LIBCMT ref: 001822BE
                                                            • Part of subcall function 001829C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0018D7D1,00000000,00000000,00000000,00000000,?,0018D7F8,00000000,00000007,00000000,?,0018DBF5,00000000), ref: 001829DE
                                                            • Part of subcall function 001829C8: GetLastError.KERNEL32(00000000,?,0018D7D1,00000000,00000000,00000000,00000000,?,0018D7F8,00000000,00000007,00000000,?,0018DBF5,00000000,00000000), ref: 001829F0
                                                          • _free.LIBCMT ref: 001822D0
                                                          • _free.LIBCMT ref: 001822E3
                                                          • _free.LIBCMT ref: 001822F4
                                                          • _free.LIBCMT ref: 00182305
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 2253b49d67bf9e44c06f505277f11ad871e710050b80465cff6056c6cfb44e0a
                                                          • Instruction ID: 107266f03a7132f327449c6597ddb6fe465b9aa4763c1166d01daab8b524b9b5
                                                          • Opcode Fuzzy Hash: 2253b49d67bf9e44c06f505277f11ad871e710050b80465cff6056c6cfb44e0a
                                                          • Instruction Fuzzy Hash: 3CF030B4880130AB8623BFD4BC498483B65B7387507122606F814D3272CF3416639FA4
                                                          APIs
                                                          • EndPath.GDI32(?), ref: 001695D4
                                                          • StrokeAndFillPath.GDI32(?,?,001A71F7,00000000,?,?,?), ref: 001695F0
                                                          • SelectObject.GDI32(?,00000000), ref: 00169603
                                                          • DeleteObject.GDI32 ref: 00169616
                                                          • StrokePath.GDI32(?), ref: 00169631
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                                          • String ID:
                                                          • API String ID: 2625713937-0
                                                          • Opcode ID: de59e9464d4e1be9db61c502809dd9f6839b8909dedc0c1e2b735deb374f4970
                                                          • Instruction ID: 4c524640da1133d827d86fe88e92990ec3bcc0cd4ca179ec3a1cad6367edb3fb
                                                          • Opcode Fuzzy Hash: de59e9464d4e1be9db61c502809dd9f6839b8909dedc0c1e2b735deb374f4970
                                                          • Instruction Fuzzy Hash: B2F0C9350053C8EBDB265FA9ED5CB683B65AB11322F049214F465594F0C73089F7DF60
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: __freea$_free
                                                          • String ID: a/p$am/pm
                                                          • API String ID: 3432400110-3206640213
                                                          • Opcode ID: 162ae20fbf80fe996205bb6fa14d8d49e0f359ea18329e70d1903acecf63fb78
                                                          • Instruction ID: 6a427964ef79f1e446761cf10dcdfe939daafe30cd2ebca6cab6a48620859363
                                                          • Opcode Fuzzy Hash: 162ae20fbf80fe996205bb6fa14d8d49e0f359ea18329e70d1903acecf63fb78
                                                          • Instruction Fuzzy Hash: BED10433900206EACB28BF68C845BFAB7B9FF16710F294159E9059B650D3759F82CF51
                                                          APIs
                                                            • Part of subcall function 00170242: EnterCriticalSection.KERNEL32(0022070C,00221884,?,?,0016198B,00222518,?,?,?,001512F9,00000000), ref: 0017024D
                                                            • Part of subcall function 00170242: LeaveCriticalSection.KERNEL32(0022070C,?,0016198B,00222518,?,?,?,001512F9,00000000), ref: 0017028A
                                                            • Part of subcall function 001700A3: __onexit.LIBCMT ref: 001700A9
                                                          • __Init_thread_footer.LIBCMT ref: 001D6238
                                                            • Part of subcall function 001701F8: EnterCriticalSection.KERNEL32(0022070C,?,?,00168747,00222514), ref: 00170202
                                                            • Part of subcall function 001701F8: LeaveCriticalSection.KERNEL32(0022070C,?,00168747,00222514), ref: 00170235
                                                            • Part of subcall function 001C359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 001C35E4
                                                            • Part of subcall function 001C359C: LoadStringW.USER32(00222390,?,00000FFF,?), ref: 001C360A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                                          • String ID: x#"$x#"$x#"
                                                          • API String ID: 1072379062-2717048500
                                                          • Opcode ID: 406a1dc8afe65632503b262d9c69ac15d3583292a07f08d2689170b148a151a9
                                                          • Instruction ID: bfa7aa91f0c1e63cc613c375ecdcdee27f9cb44ede8b36ed7d4e646dc2912c9d
                                                          • Opcode Fuzzy Hash: 406a1dc8afe65632503b262d9c69ac15d3583292a07f08d2689170b148a151a9
                                                          • Instruction Fuzzy Hash: 31C16A71A00205AFCB14DF98D891EBEB7B9EF58340F10816AF915AB391DB70E985CB90
                                                          APIs
                                                            • Part of subcall function 00170242: EnterCriticalSection.KERNEL32(0022070C,00221884,?,?,0016198B,00222518,?,?,?,001512F9,00000000), ref: 0017024D
                                                            • Part of subcall function 00170242: LeaveCriticalSection.KERNEL32(0022070C,?,0016198B,00222518,?,?,?,001512F9,00000000), ref: 0017028A
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                            • Part of subcall function 001700A3: __onexit.LIBCMT ref: 001700A9
                                                          • __Init_thread_footer.LIBCMT ref: 001D7BFB
                                                            • Part of subcall function 001701F8: EnterCriticalSection.KERNEL32(0022070C,?,?,00168747,00222514), ref: 00170202
                                                            • Part of subcall function 001701F8: LeaveCriticalSection.KERNEL32(0022070C,?,00168747,00222514), ref: 00170235
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                          • String ID: 5$G$Variable must be of type 'Object'.
                                                          • API String ID: 535116098-3733170431
                                                          • Opcode ID: 6a80c0a9eb841456cba3d513b1fa83283e26a32446ae5f82bb7422fdabd96e7b
                                                          • Instruction ID: 2bb7329ad05a93c68b79b5e72f6bb6aacdf846d9924152d66c3431f61775a775
                                                          • Opcode Fuzzy Hash: 6a80c0a9eb841456cba3d513b1fa83283e26a32446ae5f82bb7422fdabd96e7b
                                                          • Instruction Fuzzy Hash: 3A918B71A04609EFCB14EF94D891DADB7B2FF59300F50805AF806AB392EB71AE45CB51
                                                          APIs
                                                            • Part of subcall function 001BB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001B21D0,?,?,00000034,00000800,?,00000034), ref: 001BB42D
                                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 001B2760
                                                            • Part of subcall function 001BB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001B21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 001BB3F8
                                                            • Part of subcall function 001BB32A: GetWindowThreadProcessId.USER32(?,?), ref: 001BB355
                                                            • Part of subcall function 001BB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,001B2194,00000034,?,?,00001004,00000000,00000000), ref: 001BB365
                                                            • Part of subcall function 001BB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,001B2194,00000034,?,?,00001004,00000000,00000000), ref: 001BB37B
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 001B27CD
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 001B281A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                          • String ID: @
                                                          • API String ID: 4150878124-2766056989
                                                          • Opcode ID: 2116ec2efc49bd195ccf14a50201a144ab3cb7d4e618b75d7f7b3af22e78c2db
                                                          • Instruction ID: 51ce2d8a171ee64ab2b5187b5b6f20aa083fb550fe0eb2cd5cef0171e9208ecd
                                                          • Opcode Fuzzy Hash: 2116ec2efc49bd195ccf14a50201a144ab3cb7d4e618b75d7f7b3af22e78c2db
                                                          • Instruction Fuzzy Hash: 25410B76900218AFDB10DBA4CD85AEEBBB8AF19700F104095FA55B7191DB706E89CBA1
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00181769
                                                          • _free.LIBCMT ref: 00181834
                                                          • _free.LIBCMT ref: 0018183E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$FileModuleName
                                                          • String ID: C:\Users\user\Desktop\file.exe
                                                          • API String ID: 2506810119-1957095476
                                                          • Opcode ID: 20dbab01b37013ac8751977ca752f9e95c8b61901e9df788cbc846e0edb112c0
                                                          • Instruction ID: 25b1637e87d1ea04a8131f135ee3485f8733aac8d797f9f7df5d295462f39acd
                                                          • Opcode Fuzzy Hash: 20dbab01b37013ac8751977ca752f9e95c8b61901e9df788cbc846e0edb112c0
                                                          • Instruction Fuzzy Hash: 46318E72A00218FBDB21EB999885D9EBBFCEBA5310B1041AAF80497211D7708F42CF90
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 001BC306
                                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 001BC34C
                                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00221990,00DD55F8), ref: 001BC395
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Delete$InfoItem
                                                          • String ID: 0
                                                          • API String ID: 135850232-4108050209
                                                          • Opcode ID: 501a6b8ced9f348cc5f2ab86fab17f6472a3952dbd62d5fe6d05180bbe4a62a1
                                                          • Instruction ID: 194bb264b45e44a142006ff3f8f18a22a391342694e33586f5769a1dbbed6b14
                                                          • Opcode Fuzzy Hash: 501a6b8ced9f348cc5f2ab86fab17f6472a3952dbd62d5fe6d05180bbe4a62a1
                                                          • Instruction Fuzzy Hash: D341AE312043419FD724DF25D884F9BBBE4BF95320F048A1EF8A59B2E1D770A904CBA2
                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,001ECC08,00000000,?,?,?,?), ref: 001E44AA
                                                          • GetWindowLongW.USER32 ref: 001E44C7
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 001E44D7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID: SysTreeView32
                                                          • API String ID: 847901565-1698111956
                                                          • Opcode ID: 17955d300f21d9198d66d35a70e32a25e6088c222b784d9d642d671db42a6d95
                                                          • Instruction ID: 4f948de105af6f83bcd7a292fd7c517870a6fff8396bcedd57766362a476087a
                                                          • Opcode Fuzzy Hash: 17955d300f21d9198d66d35a70e32a25e6088c222b784d9d642d671db42a6d95
                                                          • Instruction Fuzzy Hash: 35319C32210A85AFDB208E79DC45BEA77A9EF08334F204325F975921D0D770AC519790
                                                          APIs
                                                            • Part of subcall function 001D335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,001D3077,?,?), ref: 001D3378
                                                          • inet_addr.WSOCK32(?), ref: 001D307A
                                                          • _wcslen.LIBCMT ref: 001D309B
                                                          • htons.WSOCK32(00000000), ref: 001D3106
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                          • String ID: 255.255.255.255
                                                          • API String ID: 946324512-2422070025
                                                          • Opcode ID: fed38efe02cac8b68d036469b11cb5287a50e4a2b2ba62b4e4e72457dd62ba2c
                                                          • Instruction ID: 36302389bd5b74fc7963aeda48b6f4581fe5c78bd5deb5353fde337ffd33a6ed
                                                          • Opcode Fuzzy Hash: fed38efe02cac8b68d036469b11cb5287a50e4a2b2ba62b4e4e72457dd62ba2c
                                                          • Instruction Fuzzy Hash: 8D31E739200206DFC710CF68C985EA977F0EF54318F25815AE9258F792D771EE45C762
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 001E3F40
                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 001E3F54
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 001E3F78
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window
                                                          • String ID: SysMonthCal32
                                                          • API String ID: 2326795674-1439706946
                                                          • Opcode ID: 8eb197c1462b58c79c10457f422fe0326e82cceb01a9d71582fab179219b30fa
                                                          • Instruction ID: 62871996ee1bea0a938621e82ff4699780f2478d46b38363542471b570526bd8
                                                          • Opcode Fuzzy Hash: 8eb197c1462b58c79c10457f422fe0326e82cceb01a9d71582fab179219b30fa
                                                          • Instruction Fuzzy Hash: 2D21AD32600259BBDF218F91CC86FEE3BB5EF48714F110214FA156B1D0D7B1A9918B90
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 001E4705
                                                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 001E4713
                                                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 001E471A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyWindow
                                                          • String ID: msctls_updown32
                                                          • API String ID: 4014797782-2298589950
                                                          • Opcode ID: 9445f19e3b451023975e108c6747f6949870f3ccc3e210c36d671110fa1eaf0c
                                                          • Instruction ID: dcb127bb1972fdd92ed84acc346042486dc44a093492411b7665f8c063e11d23
                                                          • Opcode Fuzzy Hash: 9445f19e3b451023975e108c6747f6949870f3ccc3e210c36d671110fa1eaf0c
                                                          • Instruction Fuzzy Hash: A42160B5600648AFDB10DF65DCC1DAB37EDEF5A7A4B040059FA009B351CB70EC62CAA0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                          • API String ID: 176396367-2734436370
                                                          • Opcode ID: 2c67811d84d465d490382df9eaf49a0512ace1820f3d3f73c4af246ca5209a89
                                                          • Instruction ID: 08d58ab944dd2d163dffa6f409810c5fcdfc3863f4d01ead0195c5f079be93af
                                                          • Opcode Fuzzy Hash: 2c67811d84d465d490382df9eaf49a0512ace1820f3d3f73c4af246ca5209a89
                                                          • Instruction Fuzzy Hash: 0D216A32244650A6D331AB25EC06FFB73E8AFA5300F10802AFF499B081EB51AD57C2D5
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 001E3840
                                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 001E3850
                                                          • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 001E3876
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MoveWindow
                                                          • String ID: Listbox
                                                          • API String ID: 3315199576-2633736733
                                                          • Opcode ID: 902d0cd89c69e3caa52ac9ccaf1e7a7b522e829fe37bdf703a4c42d8b240ca3b
                                                          • Instruction ID: c6b3af4d9b76458da474c0d44e8630a58ffee346f63180ec1bd1da2dd3f0f71e
                                                          • Opcode Fuzzy Hash: 902d0cd89c69e3caa52ac9ccaf1e7a7b522e829fe37bdf703a4c42d8b240ca3b
                                                          • Instruction Fuzzy Hash: 95218072610158BBEB218F96DC89EAF376AEF99750F118124F9149B190C771DC5287A0
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 001C4A08
                                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 001C4A5C
                                                          • SetErrorMode.KERNEL32(00000000,?,?,001ECC08), ref: 001C4AD0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume
                                                          • String ID: %lu
                                                          • API String ID: 2507767853-685833217
                                                          • Opcode ID: 2011558527290d1fe8a3e3c8fe38caf8e63b1b3159c92361473511acfa11f66a
                                                          • Instruction ID: 274e549ec4d2a4b158e85a112dadda25490d7f5c1a6a5db5bdf618cb7d555f1d
                                                          • Opcode Fuzzy Hash: 2011558527290d1fe8a3e3c8fe38caf8e63b1b3159c92361473511acfa11f66a
                                                          • Instruction Fuzzy Hash: A7312D75A00109EFDB10DF54C885EAA77E8EF15308F148099E905DF252D771ED46CBA1
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 001E424F
                                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 001E4264
                                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 001E4271
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: msctls_trackbar32
                                                          • API String ID: 3850602802-1010561917
                                                          • Opcode ID: 256f8d92df48c74b7ab759dd77d445611d8363fc571a1b77503eb1e69e51c881
                                                          • Instruction ID: 3c6b4881a58c3e623445cdec4c664c663ae3b4479144e521d80e5917a8b9eb99
                                                          • Opcode Fuzzy Hash: 256f8d92df48c74b7ab759dd77d445611d8363fc571a1b77503eb1e69e51c881
                                                          • Instruction Fuzzy Hash: 7011E331240288BFEF205F69DC46FAB7BACEF99B64F010124FA55E6090D371D8619B50
                                                          APIs
                                                            • Part of subcall function 00156B57: _wcslen.LIBCMT ref: 00156B6A
                                                            • Part of subcall function 001B2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 001B2DC5
                                                            • Part of subcall function 001B2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 001B2DD6
                                                            • Part of subcall function 001B2DA7: GetCurrentThreadId.KERNEL32 ref: 001B2DDD
                                                            • Part of subcall function 001B2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 001B2DE4
                                                          • GetFocus.USER32 ref: 001B2F78
                                                            • Part of subcall function 001B2DEE: GetParent.USER32(00000000), ref: 001B2DF9
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 001B2FC3
                                                          • EnumChildWindows.USER32(?,001B303B), ref: 001B2FEB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                          • String ID: %s%d
                                                          • API String ID: 1272988791-1110647743
                                                          • Opcode ID: e0311200b85fdea131d6ef3f919d41024adc6766e37fd0f756edb1ee1a12dfda
                                                          • Instruction ID: aeb4f28968df2c37d281e3ec64f33db628ec5389d756338d2afc41b5962f4cbc
                                                          • Opcode Fuzzy Hash: e0311200b85fdea131d6ef3f919d41024adc6766e37fd0f756edb1ee1a12dfda
                                                          • Instruction Fuzzy Hash: CF11B471700205ABCF147FB08CC5EEE776AAFA9304F044075FD199B252DF70994A8BA0
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 001E58C1
                                                          • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 001E58EE
                                                          • DrawMenuBar.USER32(?), ref: 001E58FD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$InfoItem$Draw
                                                          • String ID: 0
                                                          • API String ID: 3227129158-4108050209
                                                          • Opcode ID: e3de92ad32b4a62f0baf462da8ad6ce62c102cb367570aa35ac91c7ad7a90246
                                                          • Instruction ID: f4d0346a56bdf7918586f3873aa8091c0fb720261c98aef7a2bb8f9728d75ccb
                                                          • Opcode Fuzzy Hash: e3de92ad32b4a62f0baf462da8ad6ce62c102cb367570aa35ac91c7ad7a90246
                                                          • Instruction Fuzzy Hash: E701AD31600688EFDB209F52EC44BEEBFB5FF45369F008099E848DA152DB308A91DF20
                                                          APIs
                                                          • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 001AD3BF
                                                          • FreeLibrary.KERNEL32 ref: 001AD3E5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressFreeLibraryProc
                                                          • String ID: GetSystemWow64DirectoryW$X64
                                                          • API String ID: 3013587201-2590602151
                                                          • Opcode ID: cff1ae8270fda0e63b141e4d0fb782356f8e9515f18fa6d2f27ce5feb5cea9fd
                                                          • Instruction ID: 7fbf4d3b65e264529e84065f51a90e0024ba89d40263040fbe092a3435428beb
                                                          • Opcode Fuzzy Hash: cff1ae8270fda0e63b141e4d0fb782356f8e9515f18fa6d2f27ce5feb5cea9fd
                                                          • Instruction Fuzzy Hash: 5AF05569802E21DBCB3543116C54AAD3324BF12741B5A415AF403F5808DB20CD95C2C2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a280207e0aecd811d9e1302a72bde27c76ea24e314fe2f10bf85aab834fddc70
                                                          • Instruction ID: cb3ccee6a1ee809fd691ac93f07862a2dd6d692361922131878023ea9a06bf95
                                                          • Opcode Fuzzy Hash: a280207e0aecd811d9e1302a72bde27c76ea24e314fe2f10bf85aab834fddc70
                                                          • Instruction Fuzzy Hash: 58C14C75A0021AEFDB15CFA8C898AAEB7B5FF48704F118598E505EB261D731ED81CB90
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: __alldvrm$_strrchr
                                                          • String ID:
                                                          • API String ID: 1036877536-0
                                                          • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                          • Instruction ID: 7445ef4685ab88ceb853f0eacf85e1820f6bb22b5d30660a64c4433eab6d54b6
                                                          • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                          • Instruction Fuzzy Hash: 71A15871E003879FEB15EF18C8917AEBBE4EF61350F18416DE5959B282CB349A81CF91
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInitInitializeUninitialize
                                                          • String ID:
                                                          • API String ID: 1998397398-0
                                                          • Opcode ID: 6ab6c429bc4c692a0afacbb95eafda965b9316f7f7db1ea370120169f8298a08
                                                          • Instruction ID: e7d70af082f41b1b90189db9ab7fba10cf62b3b0b52a78c2ed31423220d1313b
                                                          • Opcode Fuzzy Hash: 6ab6c429bc4c692a0afacbb95eafda965b9316f7f7db1ea370120169f8298a08
                                                          • Instruction Fuzzy Hash: CBA13D75604300DFC704DF28D485A2AB7E5FF98715F05885AF9999B3A1DB30EE05CB92
                                                          APIs
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,001EFC08,?), ref: 001B05F0
                                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,001EFC08,?), ref: 001B0608
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,001ECC40,000000FF,?,00000000,00000800,00000000,?,001EFC08,?), ref: 001B062D
                                                          • _memcmp.LIBVCRUNTIME ref: 001B064E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: FromProg$FreeTask_memcmp
                                                          • String ID:
                                                          • API String ID: 314563124-0
                                                          • Opcode ID: 228ce35680434a1cd5918676e3822a2dd4220a4df71b777d3281d910ec8ea6fe
                                                          • Instruction ID: e39592b26319df60fdc9b23054b8e0f4436dd13f782a0ead90e763e7c9cc0fb0
                                                          • Opcode Fuzzy Hash: 228ce35680434a1cd5918676e3822a2dd4220a4df71b777d3281d910ec8ea6fe
                                                          • Instruction Fuzzy Hash: 53810971A00209EFCB05DF98C984EEEB7B9FF89315F204558E516EB250DB71AE46CB60
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: d19c58542035b89ec82fb8ae987c8fb0d57feb8534b5642bd6f4274a760b994c
                                                          • Instruction ID: bb03df5c9737b60ce2ec77978f155002fe242829ef646c085acb5c293937fe60
                                                          • Opcode Fuzzy Hash: d19c58542035b89ec82fb8ae987c8fb0d57feb8534b5642bd6f4274a760b994c
                                                          • Instruction Fuzzy Hash: B4414731A00102BBDF257BF89C466BE3AB4FF69370F254225F81897192E73489C18762
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 001E62E2
                                                          • ScreenToClient.USER32(?,?), ref: 001E6315
                                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 001E6382
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientMoveRectScreen
                                                          • String ID:
                                                          • API String ID: 3880355969-0
                                                          • Opcode ID: 8b681f46cfa9fff5615ef6bea497bbac3969f2a407c1632820a731b0ba257b3d
                                                          • Instruction ID: 15959797951c1ad14625715ee0d381cd75643190966e0d75b73b29a7f73d56c2
                                                          • Opcode Fuzzy Hash: 8b681f46cfa9fff5615ef6bea497bbac3969f2a407c1632820a731b0ba257b3d
                                                          • Instruction Fuzzy Hash: BF516274900685EFCF10DF55D8849AE7BB6FF653A0F508159F9159B290D730ED81CB90
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 001D1AFD
                                                          • WSAGetLastError.WSOCK32 ref: 001D1B0B
                                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 001D1B8A
                                                          • WSAGetLastError.WSOCK32 ref: 001D1B94
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$socket
                                                          • String ID:
                                                          • API String ID: 1881357543-0
                                                          • Opcode ID: 882fd889794751b86f880626c1f64a85ddf3807fb70bab3d8b8ec18415d88373
                                                          • Instruction ID: dc9e653a9dbf206e6a483291d1a077dc99d5ca9fe0ebd34a7cc33a2bfb1aca87
                                                          • Opcode Fuzzy Hash: 882fd889794751b86f880626c1f64a85ddf3807fb70bab3d8b8ec18415d88373
                                                          • Instruction Fuzzy Hash: B041A034600200BFE720AF24D886F2A77E5AB58718F54845DF96A9F7D2D772ED42CB90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b7e1381281c8f8686ab8de43496ab58c45e9420f108623c2a2f6f954c5b532fe
                                                          • Instruction ID: f2e776e55a859074d6a0b3395ef26b1f5ccc7a646f84079ab6d2fdb41c2dc6b4
                                                          • Opcode Fuzzy Hash: b7e1381281c8f8686ab8de43496ab58c45e9420f108623c2a2f6f954c5b532fe
                                                          • Instruction Fuzzy Hash: 60412B72A04304BFD725AF38CC82B6B7BE9EB94710F10452EF546DB292D3719A418B90
                                                          APIs
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 001C5783
                                                          • GetLastError.KERNEL32(?,00000000), ref: 001C57A9
                                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 001C57CE
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 001C57FA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                                          • String ID:
                                                          • API String ID: 3321077145-0
                                                          • Opcode ID: 30d101164f9f194c94368aeefd8349b2dd5f9df86e0b44b440dcdd8d9c743948
                                                          • Instruction ID: 733dc6b9b03cdf19e4a0c0efbcba7eb371cf318c280a8343bf32ded21fccd3d1
                                                          • Opcode Fuzzy Hash: 30d101164f9f194c94368aeefd8349b2dd5f9df86e0b44b440dcdd8d9c743948
                                                          • Instruction Fuzzy Hash: 74415D39600610DFCB10DF55D485A5EBBE2EF99321B198488EC5AAF3A2DB30FD45CB91
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00176D71,00000000,00000000,001782D9,?,001782D9,?,00000001,00176D71,8BE85006,00000001,001782D9,001782D9), ref: 0018D910
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0018D999
                                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0018D9AB
                                                          • __freea.LIBCMT ref: 0018D9B4
                                                            • Part of subcall function 00183820: RtlAllocateHeap.NTDLL(00000000,?,00221444,?,0016FDF5,?,?,0015A976,00000010,00221440,001513FC,?,001513C6,?,00151129), ref: 00183852
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                          • String ID:
                                                          • API String ID: 2652629310-0
                                                          • Opcode ID: 3e76ae07e1325d50afdaa2586979d84d27a519f733d59ce19434bdb47ceb0573
                                                          • Instruction ID: fd4bb9f7dea0009ab7939417fff7d172ac2bddd42fa3f90be23e9203136373e1
                                                          • Opcode Fuzzy Hash: 3e76ae07e1325d50afdaa2586979d84d27a519f733d59ce19434bdb47ceb0573
                                                          • Instruction Fuzzy Hash: B731D272A0021AABDF25AF65EC41EAE7BA5EB41714F054168FC08D7190EB35CE51CB90
                                                          APIs
                                                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 001E5352
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 001E5375
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 001E5382
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 001E53A8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$InvalidateMessageRectSend
                                                          • String ID:
                                                          • API String ID: 3340791633-0
                                                          • Opcode ID: 6ddcfbc5c881e481c6dcf27d6a83fc9ead0e6f431b5b1ac3b676930c20402cbf
                                                          • Instruction ID: 2f491a41d5217aa22529be37b900f4ffd0c0111fb5350edc33af9b2b97fbca84
                                                          • Opcode Fuzzy Hash: 6ddcfbc5c881e481c6dcf27d6a83fc9ead0e6f431b5b1ac3b676930c20402cbf
                                                          • Instruction Fuzzy Hash: BA31DE34A55E88EFEB349A56CC46FED7767BB04398F584102FA10962E1C7B09980DB82
                                                          APIs
                                                          • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 001BABF1
                                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 001BAC0D
                                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 001BAC74
                                                          • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 001BACC6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: 6477ab89c30603a7aba665810f201caeed835101f4099f51ddf11a32736d61c5
                                                          • Instruction ID: f37f863ee7e4d19b67551c6ca7b10cd812deb7ff55473df822427f5c7b52313f
                                                          • Opcode Fuzzy Hash: 6477ab89c30603a7aba665810f201caeed835101f4099f51ddf11a32736d61c5
                                                          • Instruction Fuzzy Hash: E9314630A00358AFFF35CB65CC497FE7FA5AF89310F84431AE481962D1D374998187A2
                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 001E769A
                                                          • GetWindowRect.USER32(?,?), ref: 001E7710
                                                          • PtInRect.USER32(?,?,001E8B89), ref: 001E7720
                                                          • MessageBeep.USER32(00000000), ref: 001E778C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Rect$BeepClientMessageScreenWindow
                                                          • String ID:
                                                          • API String ID: 1352109105-0
                                                          • Opcode ID: 4629f8127e45e0c8963f1aa0c37110ea99fda3b5b60cafb8b862a192fbb9d5a2
                                                          • Instruction ID: a3581d90bca773694823afcefeba1646b45447e3f13d2e62680492b372ca3202
                                                          • Opcode Fuzzy Hash: 4629f8127e45e0c8963f1aa0c37110ea99fda3b5b60cafb8b862a192fbb9d5a2
                                                          • Instruction Fuzzy Hash: 0841A034A05694EFEB11CF9AD898EADB7F4FF59304F1540A8E4149B2A1C330A982CF90
                                                          APIs
                                                          • GetForegroundWindow.USER32 ref: 001E16EB
                                                            • Part of subcall function 001B3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 001B3A57
                                                            • Part of subcall function 001B3A3D: GetCurrentThreadId.KERNEL32 ref: 001B3A5E
                                                            • Part of subcall function 001B3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001B25B3), ref: 001B3A65
                                                          • GetCaretPos.USER32(?), ref: 001E16FF
                                                          • ClientToScreen.USER32(00000000,?), ref: 001E174C
                                                          • GetForegroundWindow.USER32 ref: 001E1752
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                          • String ID:
                                                          • API String ID: 2759813231-0
                                                          • Opcode ID: d3b4568b24014f481bf9af61d4623a5633ab50429f6427e0f9ca334ea04c68d4
                                                          • Instruction ID: c278c9112368146cd88649b30dac667456a3d0518a0da61756d4290197422b01
                                                          • Opcode Fuzzy Hash: d3b4568b24014f481bf9af61d4623a5633ab50429f6427e0f9ca334ea04c68d4
                                                          • Instruction Fuzzy Hash: B7314171D00249AFC704EFAAC8C1CEEB7F9EF59304B50806AE425EB251D7719E45CBA0
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 001BD501
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 001BD50F
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 001BD52F
                                                          • CloseHandle.KERNEL32(00000000), ref: 001BD5DC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                          • String ID:
                                                          • API String ID: 420147892-0
                                                          • Opcode ID: eee654ed68d241c6c11964aca8c6868bb4f5b5e50700c708d461648c4cd63562
                                                          • Instruction ID: 47fcbbaa182a48eac7e539164a4c5f0a60f023f616c78ad5da5e7a6c0caacac8
                                                          • Opcode Fuzzy Hash: eee654ed68d241c6c11964aca8c6868bb4f5b5e50700c708d461648c4cd63562
                                                          • Instruction Fuzzy Hash: 19319031008340DFD314EF54D881AAFBBF8EFA9344F54092DF9918A1A1EB719989CB92
                                                          APIs
                                                            • Part of subcall function 00169BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00169BB2
                                                          • GetCursorPos.USER32(?), ref: 001E9001
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,001A7711,?,?,?,?,?), ref: 001E9016
                                                          • GetCursorPos.USER32(?), ref: 001E905E
                                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,001A7711,?,?,?), ref: 001E9094
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                          • String ID:
                                                          • API String ID: 2864067406-0
                                                          • Opcode ID: e535c185c1f15933aca1b70ebabde5f8722bf9a449ea88d2e62c704b2825381c
                                                          • Instruction ID: 07a48393b80b178ff8dc94814b513866549663635535062e04964ad28ab26fb0
                                                          • Opcode Fuzzy Hash: e535c185c1f15933aca1b70ebabde5f8722bf9a449ea88d2e62c704b2825381c
                                                          • Instruction Fuzzy Hash: C221D172600558FFCB258F95CC98EFE7BB9EF89350F444055F9058B261C3319AA1DBA0
                                                          APIs
                                                          • GetFileAttributesW.KERNEL32(?,001ECB68), ref: 001BD2FB
                                                          • GetLastError.KERNEL32 ref: 001BD30A
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 001BD319
                                                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,001ECB68), ref: 001BD376
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory$AttributesErrorFileLast
                                                          • String ID:
                                                          • API String ID: 2267087916-0
                                                          • Opcode ID: 4c441b3c6af76c3074bbbad3764ad812c3a8915df5723480c79fb1e8f9c9d735
                                                          • Instruction ID: 63dc299bb64272bf914e0637f6592426d026b28c3aae46a2320fdac3ec6dcbea
                                                          • Opcode Fuzzy Hash: 4c441b3c6af76c3074bbbad3764ad812c3a8915df5723480c79fb1e8f9c9d735
                                                          • Instruction Fuzzy Hash: 9D2171B0505301DF8718DF68D8814AE77E4BF55764F104A1DF8A9CB2A2E731D94ACB93
                                                          APIs
                                                            • Part of subcall function 001B1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 001B102A
                                                            • Part of subcall function 001B1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 001B1036
                                                            • Part of subcall function 001B1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 001B1045
                                                            • Part of subcall function 001B1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 001B104C
                                                            • Part of subcall function 001B1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 001B1062
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 001B15BE
                                                          • _memcmp.LIBVCRUNTIME ref: 001B15E1
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001B1617
                                                          • HeapFree.KERNEL32(00000000), ref: 001B161E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                          • String ID:
                                                          • API String ID: 1592001646-0
                                                          • Opcode ID: ac69ad9dd6e82f02be1710118516b122188af3c4a00bab0af07b2e88e27ccdeb
                                                          • Instruction ID: 43b7fdb36078d8ec6117ca69dadcea068772ad06f5cd4ad79c6a2b8bf60ef420
                                                          • Opcode Fuzzy Hash: ac69ad9dd6e82f02be1710118516b122188af3c4a00bab0af07b2e88e27ccdeb
                                                          • Instruction Fuzzy Hash: 1E21AC32E00208FFDF10DFA5C965BEEB7B8EF45354F4A8459E441AB241E770AA45CBA0
                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 001E280A
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 001E2824
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 001E2832
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 001E2840
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$AttributesLayered
                                                          • String ID:
                                                          • API String ID: 2169480361-0
                                                          • Opcode ID: 39f6c055cb0768054cfa28b04f092c7c6bfece6c8a63bf8af3c608e777d961ad
                                                          • Instruction ID: 5418bf91bd2b4b1b0f5f122f834d851e36490f72e5258ff4e49beafd6c6d075e
                                                          • Opcode Fuzzy Hash: 39f6c055cb0768054cfa28b04f092c7c6bfece6c8a63bf8af3c608e777d961ad
                                                          • Instruction Fuzzy Hash: 1121F431604990AFD7149B25CC95FAE7799AF95324F148158F8268F6D2C771FC82C7D0
                                                          APIs
                                                            • Part of subcall function 001B8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,001B790A,?,000000FF,?,001B8754,00000000,?,0000001C,?,?), ref: 001B8D8C
                                                            • Part of subcall function 001B8D7D: lstrcpyW.KERNEL32(00000000,?,?,001B790A,?,000000FF,?,001B8754,00000000,?,0000001C,?,?,00000000), ref: 001B8DB2
                                                            • Part of subcall function 001B8D7D: lstrcmpiW.KERNEL32(00000000,?,001B790A,?,000000FF,?,001B8754,00000000,?,0000001C,?,?), ref: 001B8DE3
                                                          • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,001B8754,00000000,?,0000001C,?,?,00000000), ref: 001B7923
                                                          • lstrcpyW.KERNEL32(00000000,?,?,001B8754,00000000,?,0000001C,?,?,00000000), ref: 001B7949
                                                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,001B8754,00000000,?,0000001C,?,?,00000000), ref: 001B7984
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: lstrcmpilstrcpylstrlen
                                                          • String ID: cdecl
                                                          • API String ID: 4031866154-3896280584
                                                          • Opcode ID: 078ca9ed4b6346f1e9b2cafaba37f4315a893ac254beeab059ce12216a136874
                                                          • Instruction ID: 446d6b0ead6fe286b82933afe4687ab0f7115d3e0fded0719ee9be3b60822383
                                                          • Opcode Fuzzy Hash: 078ca9ed4b6346f1e9b2cafaba37f4315a893ac254beeab059ce12216a136874
                                                          • Instruction Fuzzy Hash: 1D11263A200342ABCB15AF74DC44DBA77A9FF95764B00402AF802CB2A4EB31D812C7A1
                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 001E7D0B
                                                          • SetWindowLongW.USER32(00000000,000000F0,?), ref: 001E7D2A
                                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 001E7D42
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,001CB7AD,00000000), ref: 001E7D6B
                                                            • Part of subcall function 00169BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00169BB2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID:
                                                          • API String ID: 847901565-0
                                                          • Opcode ID: 2a77bd631556dfb89eb9bc08660b8b87f50442ae81bcfa2361f67333869f35ad
                                                          • Instruction ID: 3ae8975035c771faa20d49b498750345ea4753a893dc68b995211411eabc8d78
                                                          • Opcode Fuzzy Hash: 2a77bd631556dfb89eb9bc08660b8b87f50442ae81bcfa2361f67333869f35ad
                                                          • Instruction Fuzzy Hash: 8E11AE31204A95AFDB108FA9DC44EBA3BA4BF45360B154724F835CB2F0D73089A1CB80
                                                          APIs
                                                          • SendMessageW.USER32(?,00001060,?,00000004), ref: 001E56BB
                                                          • _wcslen.LIBCMT ref: 001E56CD
                                                          • _wcslen.LIBCMT ref: 001E56D8
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 001E5816
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend_wcslen
                                                          • String ID:
                                                          • API String ID: 455545452-0
                                                          • Opcode ID: 40bf852205a2e3ed2b573aec4d818db821c837c8d2ef5a682801f3d5bfe88e61
                                                          • Instruction ID: 67c7610adf6a37e576d34c0914502f3ebba8f9f4fd3809ff34131aaf7ff82c02
                                                          • Opcode Fuzzy Hash: 40bf852205a2e3ed2b573aec4d818db821c837c8d2ef5a682801f3d5bfe88e61
                                                          • Instruction Fuzzy Hash: 1111D375A00A99A6DF209FA2CCC5AEE77BCEF15768F148026F915D6081E770CA80CB60
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 410a2a542dbd98e980337777be7eb31321473d5b1e2807328fe84dcbe564e28c
                                                          • Instruction ID: 9bbe75c181fffc123f813da08482c2208d971a37fec86231d4fbec59caab65ad
                                                          • Opcode Fuzzy Hash: 410a2a542dbd98e980337777be7eb31321473d5b1e2807328fe84dcbe564e28c
                                                          • Instruction Fuzzy Hash: E301DBB3209A567EF62136F86CC8F2B665CDF513B8B310725F520A11D2DB208E424A60
                                                          APIs
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 001B1A47
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 001B1A59
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 001B1A6F
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 001B1A8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: 085ab49516526fe55bbdb1cd7b8be5f960e25dc62bcd9746105befc6a88761b8
                                                          • Instruction ID: a40292b94913eb253cdb6edad3f77eaaf9eccec4fbceb0a93fb475b6c635bbc8
                                                          • Opcode Fuzzy Hash: 085ab49516526fe55bbdb1cd7b8be5f960e25dc62bcd9746105befc6a88761b8
                                                          • Instruction Fuzzy Hash: 5011273A901219FFEB109BA4CD85FEDBB79EB08750F210091EA00B7290D7716E50DB94
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 001BE1FD
                                                          • MessageBoxW.USER32(?,?,?,?), ref: 001BE230
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 001BE246
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 001BE24D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                          • String ID:
                                                          • API String ID: 2880819207-0
                                                          • Opcode ID: eaabe47dd14afea5e5b6b30c73dfd3e87c169bd923cad747b24d822996b34f39
                                                          • Instruction ID: abe6a3688d147d811b50f25573720d6fc33585df944201ba5b598f0da026f622
                                                          • Opcode Fuzzy Hash: eaabe47dd14afea5e5b6b30c73dfd3e87c169bd923cad747b24d822996b34f39
                                                          • Instruction Fuzzy Hash: E411E176904258BBC721DBE8AC49ADE7BEDAB45320F104299F825E3291D7B099018BA0
                                                          APIs
                                                          • CreateThread.KERNEL32(00000000,?,0017CFF9,00000000,00000004,00000000), ref: 0017D218
                                                          • GetLastError.KERNEL32 ref: 0017D224
                                                          • __dosmaperr.LIBCMT ref: 0017D22B
                                                          • ResumeThread.KERNEL32(00000000), ref: 0017D249
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                          • String ID:
                                                          • API String ID: 173952441-0
                                                          • Opcode ID: 5311b664bebd7f6934e739e5906f2a7be05184c1ebcc9170ca65c972c1a7ca5a
                                                          • Instruction ID: fc3e66a432cae2e91e78886cfc5a2491d5d5ed5b3eac17a5a9f6fa94db7edfa8
                                                          • Opcode Fuzzy Hash: 5311b664bebd7f6934e739e5906f2a7be05184c1ebcc9170ca65c972c1a7ca5a
                                                          • Instruction Fuzzy Hash: DD01D236805208BBCB116BA5EC09BAF7A79EF91731F208219F929961D1CF70C942C6E0
                                                          APIs
                                                            • Part of subcall function 00169BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00169BB2
                                                          • GetClientRect.USER32(?,?), ref: 001E9F31
                                                          • GetCursorPos.USER32(?), ref: 001E9F3B
                                                          • ScreenToClient.USER32(?,?), ref: 001E9F46
                                                          • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 001E9F7A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Client$CursorLongProcRectScreenWindow
                                                          • String ID:
                                                          • API String ID: 4127811313-0
                                                          • Opcode ID: 60fd14a6cc96986b21fed97eee685a68f536580fc6cdf52e45ba8fa14f02d8ba
                                                          • Instruction ID: 74a082ac1d24f3f880566378d7b2ab32b8f7a65ce48c5ed8fe5c0768bb4689ec
                                                          • Opcode Fuzzy Hash: 60fd14a6cc96986b21fed97eee685a68f536580fc6cdf52e45ba8fa14f02d8ba
                                                          • Instruction Fuzzy Hash: B211367290069AABDB10DFAAD889DEE7BB9FF05311F000451F911E7151D330BA92CBE1
                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0015604C
                                                          • GetStockObject.GDI32(00000011), ref: 00156060
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 0015606A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateMessageObjectSendStockWindow
                                                          • String ID:
                                                          • API String ID: 3970641297-0
                                                          • Opcode ID: 1cb52e8c67ebc31763f474ecf7ef256dc508458a9acce96b84c2275b1ab25be6
                                                          • Instruction ID: ca1273e21113052dea6ccfbe7369bdc883fc8abeabe74e4c71ce7eeee7016993
                                                          • Opcode Fuzzy Hash: 1cb52e8c67ebc31763f474ecf7ef256dc508458a9acce96b84c2275b1ab25be6
                                                          • Instruction Fuzzy Hash: 23118B72501648FFEF164FA4DC84EEABB69EF183A5F440201FE245A150C7369CA19BE0
                                                          APIs
                                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 00173B56
                                                            • Part of subcall function 00173AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00173AD2
                                                            • Part of subcall function 00173AA3: ___AdjustPointer.LIBCMT ref: 00173AED
                                                          • _UnwindNestedFrames.LIBCMT ref: 00173B6B
                                                          • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00173B7C
                                                          • CallCatchBlock.LIBVCRUNTIME ref: 00173BA4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                          • String ID:
                                                          • API String ID: 737400349-0
                                                          • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                          • Instruction ID: 63fdb484111fcd34d67418c56c921a40c69e77d129e60978e7f4185fed160a71
                                                          • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                          • Instruction Fuzzy Hash: 6901E932100149BBDF125E95CC46EEB7B79EF58754F048018FE6C96121C732E961EBA1
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,001513C6,00000000,00000000,?,0018301A,001513C6,00000000,00000000,00000000,?,0018328B,00000006,FlsSetValue), ref: 001830A5
                                                          • GetLastError.KERNEL32(?,0018301A,001513C6,00000000,00000000,00000000,?,0018328B,00000006,FlsSetValue,001F2290,FlsSetValue,00000000,00000364,?,00182E46), ref: 001830B1
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0018301A,001513C6,00000000,00000000,00000000,?,0018328B,00000006,FlsSetValue,001F2290,FlsSetValue,00000000), ref: 001830BF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: LibraryLoad$ErrorLast
                                                          • String ID:
                                                          • API String ID: 3177248105-0
                                                          • Opcode ID: 4468cca49bc91ffa9d4a19c46fcc8eabdb0abbd636da834eb60b895b1fb29170
                                                          • Instruction ID: e03e78561e1531b4bf3e80a5f7e45164ccd89b6627098c43311297549a8ccc8e
                                                          • Opcode Fuzzy Hash: 4468cca49bc91ffa9d4a19c46fcc8eabdb0abbd636da834eb60b895b1fb29170
                                                          • Instruction Fuzzy Hash: AA01A732751322EBCB315BF9AC8896B7B98AF45F61B190720F925E7540D721DB42CBE0
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 001B747F
                                                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 001B7497
                                                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 001B74AC
                                                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 001B74CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Type$Register$FileLoadModuleNameUser
                                                          • String ID:
                                                          • API String ID: 1352324309-0
                                                          • Opcode ID: 70be6c84edc64d056eb4cf2f5221a74543564703f454e3d7ed28dda09cd4a20a
                                                          • Instruction ID: 8a6267883d3a965de25dc564b9630db69c10a9853cea973606a28e5af70636d8
                                                          • Opcode Fuzzy Hash: 70be6c84edc64d056eb4cf2f5221a74543564703f454e3d7ed28dda09cd4a20a
                                                          • Instruction Fuzzy Hash: 5611A1B12093149BE7209F54DC48FD67BFCEB40B01F108969E616DA5D1D770E944DB90
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,001BACD3,?,00008000), ref: 001BB0C4
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,001BACD3,?,00008000), ref: 001BB0E9
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,001BACD3,?,00008000), ref: 001BB0F3
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,001BACD3,?,00008000), ref: 001BB126
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CounterPerformanceQuerySleep
                                                          • String ID:
                                                          • API String ID: 2875609808-0
                                                          • Opcode ID: eba3e359d5183d3f03802919c0f87f922b98df4edd21ec01882598df3b64316f
                                                          • Instruction ID: d7d6ca2225c388a499725ca3b9db81e3dd8fdecdda71b296ed4896f4ad965c4d
                                                          • Opcode Fuzzy Hash: eba3e359d5183d3f03802919c0f87f922b98df4edd21ec01882598df3b64316f
                                                          • Instruction Fuzzy Hash: 4E113971C0552CE7CF04AFE8E9E86FEBB78FF0A711F114085E941B6681CBB096518B91
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 001E7E33
                                                          • ScreenToClient.USER32(?,?), ref: 001E7E4B
                                                          • ScreenToClient.USER32(?,?), ref: 001E7E6F
                                                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 001E7E8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ClientRectScreen$InvalidateWindow
                                                          • String ID:
                                                          • API String ID: 357397906-0
                                                          • Opcode ID: 65afbec5e2a805e3d5a04422289538ba9e167b3ffce2aa9741b6fc4711205582
                                                          • Instruction ID: bffb23cd39a0255700f9c6d34ddafb1c8953016e9a434207c6277de24a4af33c
                                                          • Opcode Fuzzy Hash: 65afbec5e2a805e3d5a04422289538ba9e167b3ffce2aa9741b6fc4711205582
                                                          • Instruction Fuzzy Hash: 3F1186B9D0024AAFDB41CF99D8849EEBBF5FF08310F104056E911E3610D734AA95CF90
                                                          APIs
                                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 001B2DC5
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 001B2DD6
                                                          • GetCurrentThreadId.KERNEL32 ref: 001B2DDD
                                                          • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 001B2DE4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 2710830443-0
                                                          • Opcode ID: 95c7b3b8bc58545193677c83e39086546a2ee8db14cb9dbf3674ceedbd74ee75
                                                          • Instruction ID: 78eb0e92972cfff952966d3d02f5f642e533261d353615e6875261b07e5b2489
                                                          • Opcode Fuzzy Hash: 95c7b3b8bc58545193677c83e39086546a2ee8db14cb9dbf3674ceedbd74ee75
                                                          • Instruction Fuzzy Hash: 9DE09272101224BBDB201BF29C4DFEF7E6CEF46BA1F000019F105D55809BA0C886C6F0
                                                          APIs
                                                            • Part of subcall function 00169639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00169693
                                                            • Part of subcall function 00169639: SelectObject.GDI32(?,00000000), ref: 001696A2
                                                            • Part of subcall function 00169639: BeginPath.GDI32(?), ref: 001696B9
                                                            • Part of subcall function 00169639: SelectObject.GDI32(?,00000000), ref: 001696E2
                                                          • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 001E8887
                                                          • LineTo.GDI32(?,?,?), ref: 001E8894
                                                          • EndPath.GDI32(?), ref: 001E88A4
                                                          • StrokePath.GDI32(?), ref: 001E88B2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                          • String ID:
                                                          • API String ID: 1539411459-0
                                                          • Opcode ID: c9951a552a88de4d3937dbfa378370f2818589534fd3bfa2054bf335c16571eb
                                                          • Instruction ID: 50293e575f18c032634952dc56eae5cdf6e1a3facc1927af38d952f567ffc050
                                                          • Opcode Fuzzy Hash: c9951a552a88de4d3937dbfa378370f2818589534fd3bfa2054bf335c16571eb
                                                          • Instruction Fuzzy Hash: 22F03A3A041698FADB125FD4AC0DFCE3A59AF16310F048000FE12690E1C77555A2CFE5
                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 001698CC
                                                          • SetTextColor.GDI32(?,?), ref: 001698D6
                                                          • SetBkMode.GDI32(?,00000001), ref: 001698E9
                                                          • GetStockObject.GDI32(00000005), ref: 001698F1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$ModeObjectStockText
                                                          • String ID:
                                                          • API String ID: 4037423528-0
                                                          • Opcode ID: 9311caa5f2984efbdd564183020a999d9506f759f0d93f20172307b240d09d65
                                                          • Instruction ID: f1722d5a1ba19309466168c2a872140b64be357324a72ec4c6b13aadee6ecc6e
                                                          • Opcode Fuzzy Hash: 9311caa5f2984efbdd564183020a999d9506f759f0d93f20172307b240d09d65
                                                          • Instruction Fuzzy Hash: 13E06D31244680EADB215BB8EC49BEC3F61EB52736F048219F6FA584E1C37146919F10
                                                          APIs
                                                          • GetCurrentThread.KERNEL32 ref: 001B1634
                                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,001B11D9), ref: 001B163B
                                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,001B11D9), ref: 001B1648
                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,001B11D9), ref: 001B164F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentOpenProcessThreadToken
                                                          • String ID:
                                                          • API String ID: 3974789173-0
                                                          • Opcode ID: 3377e023383d48d1d342e99c16e6af86068c9f8d71506c7b86d0552998e938a4
                                                          • Instruction ID: 33f6b75816b53be5178a26024104fdc0deba0cd74ffa4cfa1b1d376cc20cebad
                                                          • Opcode Fuzzy Hash: 3377e023383d48d1d342e99c16e6af86068c9f8d71506c7b86d0552998e938a4
                                                          • Instruction Fuzzy Hash: 4DE08C36602211EBD7201FE4AE4DB8F3B7CAF547A2F158808F646CD080E7748482CBA0
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 001AD858
                                                          • GetDC.USER32(00000000), ref: 001AD862
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 001AD882
                                                          • ReleaseDC.USER32(?), ref: 001AD8A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 5fb5b6bfd601eb650301cc96854fc33d617fcd7509aa6ed00e3b556a6c8c8354
                                                          • Instruction ID: 7683996b03be14eb6ceeeea1f4397ea6a63391dbab261563ee672c46cb96b620
                                                          • Opcode Fuzzy Hash: 5fb5b6bfd601eb650301cc96854fc33d617fcd7509aa6ed00e3b556a6c8c8354
                                                          • Instruction Fuzzy Hash: A0E01AB8800204DFCF419FE4DC4866EBBB1FB48311F118409F816EB750C7384992AF80
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 001AD86C
                                                          • GetDC.USER32(00000000), ref: 001AD876
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 001AD882
                                                          • ReleaseDC.USER32(?), ref: 001AD8A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: cdb952920b08dc96e74f81485cc875cd62b1e671e0f2a6c62b62080191c4e14d
                                                          • Instruction ID: f3099c2a4f126f4b9dd719f364912cdb8a383943c695fdb07094f23851925816
                                                          • Opcode Fuzzy Hash: cdb952920b08dc96e74f81485cc875cd62b1e671e0f2a6c62b62080191c4e14d
                                                          • Instruction Fuzzy Hash: 93E012B4C00200EFCF40AFE4DC8866EBBB1BB48311B108409F81AEB750CB385982AF80
                                                          APIs
                                                            • Part of subcall function 00157620: _wcslen.LIBCMT ref: 00157625
                                                          • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 001C4ED4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Connection_wcslen
                                                          • String ID: *$LPT
                                                          • API String ID: 1725874428-3443410124
                                                          • Opcode ID: d9f3a8be085910c2e63ed4b791bf2db02fb62bced4a17ad3ca48650111fa84e8
                                                          • Instruction ID: bdccafb17d88d01912f4a739ad55d167985cfabd5715cb449c37e88f0b010c42
                                                          • Opcode Fuzzy Hash: d9f3a8be085910c2e63ed4b791bf2db02fb62bced4a17ad3ca48650111fa84e8
                                                          • Instruction Fuzzy Hash: C0917B74A042049FDB14DF58C494FAABBF1AF64304F19809DE84A9F3A2D735EE85CB90
                                                          APIs
                                                          • __startOneArgErrorHandling.LIBCMT ref: 0017E30D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorHandling__start
                                                          • String ID: pow
                                                          • API String ID: 3213639722-2276729525
                                                          • Opcode ID: dfb2ac2cefe9cf1b69acf60ad67a50187fc8e5ce56ec6775b6a127ff2838a1e4
                                                          • Instruction ID: 2f0414df68c60a4ff7c075c712b45b4cffc0499d565ba97df42b11ec6c2f4479
                                                          • Opcode Fuzzy Hash: dfb2ac2cefe9cf1b69acf60ad67a50187fc8e5ce56ec6775b6a127ff2838a1e4
                                                          • Instruction Fuzzy Hash: D7513761A0C20296CB157724C94137A3BF4AB54740F34CED8E09A832E9EB35CED1DF46
                                                          APIs
                                                          • CharUpperBuffW.USER32(001A569E,00000000,?,001ECC08,?,00000000,00000000), ref: 001D78DD
                                                            • Part of subcall function 00156B57: _wcslen.LIBCMT ref: 00156B6A
                                                          • CharUpperBuffW.USER32(001A569E,00000000,?,001ECC08,00000000,?,00000000,00000000), ref: 001D783B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper$_wcslen
                                                          • String ID: <s!
                                                          • API String ID: 3544283678-2588671885
                                                          • Opcode ID: 6f136ba13e0a4b870e11e2b5d7d5b78700fcc5ea3454ab223baa48ae8a086b43
                                                          • Instruction ID: cfb542ee91d69d090ebdbc296683a686a1a9c4ac2d9e7329ceb66f450223305a
                                                          • Opcode Fuzzy Hash: 6f136ba13e0a4b870e11e2b5d7d5b78700fcc5ea3454ab223baa48ae8a086b43
                                                          • Instruction Fuzzy Hash: 31615E72914118EACF08EBA4DCA1DFDB374BF28305B844526E952AB191FF345A49DBA0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: #
                                                          • API String ID: 0-1885708031
                                                          • Opcode ID: 9574b104a20e4939a1bbffa454db2f51c8352f6b9520a6ff3fd0df1306f4e243
                                                          • Instruction ID: ed717b7508800db7161ba330e6c7f9fe28721e13770d2ac604829c4ad372bcc3
                                                          • Opcode Fuzzy Hash: 9574b104a20e4939a1bbffa454db2f51c8352f6b9520a6ff3fd0df1306f4e243
                                                          • Instruction Fuzzy Hash: C6516479900346DFDB19DFA8C891ABA7BE5EF26310F244119FC919B2C0DB349D56CBA0
                                                          APIs
                                                          • Sleep.KERNEL32(00000000), ref: 0016F2A2
                                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 0016F2BB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemorySleepStatus
                                                          • String ID: @
                                                          • API String ID: 2783356886-2766056989
                                                          • Opcode ID: c534eb53d9e58a9fb66d7975ec36ffa046410414bcd45b34734075e68dc9858d
                                                          • Instruction ID: 33689b676728d23587d7eb94e7320452bb124306e9654ff776032c993270386d
                                                          • Opcode Fuzzy Hash: c534eb53d9e58a9fb66d7975ec36ffa046410414bcd45b34734075e68dc9858d
                                                          • Instruction Fuzzy Hash: D0515771408744DBD320AF14EC86BAFBBF8FB95301F81884DF5E945196EB708529CBA6
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 001D57E0
                                                          • _wcslen.LIBCMT ref: 001D57EC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper_wcslen
                                                          • String ID: CALLARGARRAY
                                                          • API String ID: 157775604-1150593374
                                                          • Opcode ID: 7bfc63b134682a0018854c82a073104d85b78877134c8315c3802770e8a9dd96
                                                          • Instruction ID: 40d88311a2f2c46150392b930240810290fb121da801e6ccbc20ad61cddd0d03
                                                          • Opcode Fuzzy Hash: 7bfc63b134682a0018854c82a073104d85b78877134c8315c3802770e8a9dd96
                                                          • Instruction Fuzzy Hash: 2041A031A00209DFCF14DFA9C8818AEBBB6FF69314F10416AE515AB391E7349D81CB90
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 001CD130
                                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 001CD13A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CrackInternet_wcslen
                                                          • String ID: |
                                                          • API String ID: 596671847-2343686810
                                                          • Opcode ID: f7dab63c0d5173c1dae1e644be3577186482e02f7b2f5395021a4b3b01ad5c8a
                                                          • Instruction ID: 6b5276cf5ae7eddfe0135b784975c3185359ca399ad6f7b1fcc47067c3dbb471
                                                          • Opcode Fuzzy Hash: f7dab63c0d5173c1dae1e644be3577186482e02f7b2f5395021a4b3b01ad5c8a
                                                          • Instruction Fuzzy Hash: 3531F871D01109ABCF15EFA4DC85AEE7BB9FF24300F040069F815AA161D731AA46CB90
                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?,?), ref: 001E3621
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 001E365C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$DestroyMove
                                                          • String ID: static
                                                          • API String ID: 2139405536-2160076837
                                                          • Opcode ID: 51e80e53f5804a8a948efc91d1a4844604631b45b099b4a336ddb2ab66057a44
                                                          • Instruction ID: 5d4caa35a8b88a046845d9e54ab0ff147b3ea99aeab738c1e5c243c3dfea4321
                                                          • Opcode Fuzzy Hash: 51e80e53f5804a8a948efc91d1a4844604631b45b099b4a336ddb2ab66057a44
                                                          • Instruction Fuzzy Hash: D5319E71100A44AEDB109F79DC85EFF73A9FF98760F009619F8A597280DB31AD92D760
                                                          APIs
                                                          • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 001E461F
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 001E4634
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: '
                                                          • API String ID: 3850602802-1997036262
                                                          • Opcode ID: 7bd75c92e11d5884fc8a1643aa7ee902166f9d95ee5799a480e48513329f153a
                                                          • Instruction ID: b6af29e73e9d958a400243e0d7b8fb02bc79c841d8dd976b76299186daa41de7
                                                          • Opcode Fuzzy Hash: 7bd75c92e11d5884fc8a1643aa7ee902166f9d95ee5799a480e48513329f153a
                                                          • Instruction Fuzzy Hash: A8311874A01759AFDB14CFAAC990BDEBBB5FF49300F14406AE905AB391D770A941CF90
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 001E327C
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 001E3287
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: Combobox
                                                          • API String ID: 3850602802-2096851135
                                                          • Opcode ID: 31a78315ff84cecf971bcfecaf67ee4313a099e4dff3df5d7238d289c3a7603f
                                                          • Instruction ID: 61100ad46a4a10fd3b6e7eb7e646975c4849a0d3ace3081b4f5205181d7079c5
                                                          • Opcode Fuzzy Hash: 31a78315ff84cecf971bcfecaf67ee4313a099e4dff3df5d7238d289c3a7603f
                                                          • Instruction Fuzzy Hash: E411D3712005497FEF259E95DC88EAF37AAEB943A4F100124FA6897290D7319D518760
                                                          APIs
                                                            • Part of subcall function 0015600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0015604C
                                                            • Part of subcall function 0015600E: GetStockObject.GDI32(00000011), ref: 00156060
                                                            • Part of subcall function 0015600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0015606A
                                                          • GetWindowRect.USER32(00000000,?), ref: 001E377A
                                                          • GetSysColor.USER32(00000012), ref: 001E3794
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                          • String ID: static
                                                          • API String ID: 1983116058-2160076837
                                                          • Opcode ID: 8969c02eae11e5655311b9cdea95ac4e08c5541c350db938185578f0e17809ba
                                                          • Instruction ID: 6d1e68bef1bee937c8da48ced31df3082846c384055d3c08ef292048b5d043fe
                                                          • Opcode Fuzzy Hash: 8969c02eae11e5655311b9cdea95ac4e08c5541c350db938185578f0e17809ba
                                                          • Instruction Fuzzy Hash: A51159B2610649AFDF10DFA8CC49EEE7BB8EB08314F004514F965E3250D735E8519B90
                                                          APIs
                                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 001CCD7D
                                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 001CCDA6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$OpenOption
                                                          • String ID: <local>
                                                          • API String ID: 942729171-4266983199
                                                          • Opcode ID: d580bc24f97e4b7c508f3d516a5a667eca1366e0a2cbcabb5e4752a965975b2b
                                                          • Instruction ID: 5686faf0816ecec6b156ccb49130a1defc4513729ce8fb24d54205a304b25af1
                                                          • Opcode Fuzzy Hash: d580bc24f97e4b7c508f3d516a5a667eca1366e0a2cbcabb5e4752a965975b2b
                                                          • Instruction Fuzzy Hash: 7B11A77151563179D7284AA69C45FF7BE68EB227A4F014229F10E86080D770DC41D6F0
                                                          APIs
                                                          • GetWindowTextLengthW.USER32(00000000), ref: 001E34AB
                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 001E34BA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: LengthMessageSendTextWindow
                                                          • String ID: edit
                                                          • API String ID: 2978978980-2167791130
                                                          • Opcode ID: ddd86182a93c3f961c219c02b1f293b0538c88fddaac7c062cb46e43173933a9
                                                          • Instruction ID: 2e7d0b47a85f17fb0774e0d2f9c84b999c345e4860e683ef4b12bf70871a6acc
                                                          • Opcode Fuzzy Hash: ddd86182a93c3f961c219c02b1f293b0538c88fddaac7c062cb46e43173933a9
                                                          • Instruction Fuzzy Hash: C111BF71100588AFEB124E65DC88AEF376AEF15374F504324F970971D0C731DD929B50
                                                          APIs
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                          • CharUpperBuffW.USER32(?,?,?), ref: 001B6CB6
                                                          • _wcslen.LIBCMT ref: 001B6CC2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: STOP
                                                          • API String ID: 1256254125-2411985666
                                                          • Opcode ID: 91e21ff79c13f1c8dd8489e4829a7e8263a8e7334f4f2a885158b862f756da5d
                                                          • Instruction ID: 088d5af765dcec3b54c479d4915abd5065ead735fc314680db80a61a70d89301
                                                          • Opcode Fuzzy Hash: 91e21ff79c13f1c8dd8489e4829a7e8263a8e7334f4f2a885158b862f756da5d
                                                          • Instruction Fuzzy Hash: C9010032A00526CBCB20AFFDDC918FF7BB5EB75710B400928E8A29A190EB39D844C650
                                                          APIs
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                            • Part of subcall function 001B3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 001B3CCA
                                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 001B1D4C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 74b53c938c029581be1a84848072f13b5fa4ab1d1f2cd46f30c2dee73a0db3c1
                                                          • Instruction ID: 26c9c6cb9fa50c3f74982c47d15f2773704bcaea59804380c91aeeb32e56d0d6
                                                          • Opcode Fuzzy Hash: 74b53c938c029581be1a84848072f13b5fa4ab1d1f2cd46f30c2dee73a0db3c1
                                                          • Instruction Fuzzy Hash: A101B575601218EB8B08EBE4CC658FE77A9EB66350B54091AF8325B2C1EB30591D8661
                                                          APIs
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                            • Part of subcall function 001B3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 001B3CCA
                                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 001B1C46
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 3bb148c78f0c87b09cfd7c153e5a91d5d2fdbe4c2b6aa68ebd58a94232f74a9b
                                                          • Instruction ID: 5ea96a0037408dc0ed90dbceca7d08da76d8461c0481d1c237844bb828086abf
                                                          • Opcode Fuzzy Hash: 3bb148c78f0c87b09cfd7c153e5a91d5d2fdbe4c2b6aa68ebd58a94232f74a9b
                                                          • Instruction Fuzzy Hash: 8B01A775681108F6CB08EB90D9629FF7BA89F66340F540019E8166B282EB209F1C96B2
                                                          APIs
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                            • Part of subcall function 001B3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 001B3CCA
                                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 001B1CC8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: ccd710074e37496f2a0f6bd8c0bca5809918a0e0541a350b01f0907db9488ae3
                                                          • Instruction ID: 012fd4836a20d8bef3b827731a48e106013bbdb927a636c28b6f9f120157e76a
                                                          • Opcode Fuzzy Hash: ccd710074e37496f2a0f6bd8c0bca5809918a0e0541a350b01f0907db9488ae3
                                                          • Instruction Fuzzy Hash: DF01DB75640118F7CB04E794CA11AFF7BE89B21340F950015FC1177281EB209F1DD672
                                                          APIs
                                                            • Part of subcall function 00159CB3: _wcslen.LIBCMT ref: 00159CBD
                                                            • Part of subcall function 001B3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 001B3CCA
                                                          • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 001B1DD3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 32c25943b9c8436c5e63264a2fe75d7f5b0835e516f35f9d6854d7c95d2df20c
                                                          • Instruction ID: 4161c3fa190f5b91a2bf0ea86fbe66ca092153f56646e78bcda81bfffc5da089
                                                          • Opcode Fuzzy Hash: 32c25943b9c8436c5e63264a2fe75d7f5b0835e516f35f9d6854d7c95d2df20c
                                                          • Instruction Fuzzy Hash: 85F0A975A51218F6D704E7E4CC55AFF77B8AB22350F940915F8326B2C5DB605A1C8261
                                                          APIs
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00223018,0022305C), ref: 001E81BF
                                                          • CloseHandle.KERNEL32 ref: 001E81D1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateHandleProcess
                                                          • String ID: \0"
                                                          • API String ID: 3712363035-2428598737
                                                          • Opcode ID: 1bff300e1ea180ed003e92d528049b2b12445c057370e66278166a4e0005ba96
                                                          • Instruction ID: 2e40c9d42616838996e9349ade22f8f60ebb21a2413dba469735e65309b06851
                                                          • Opcode Fuzzy Hash: 1bff300e1ea180ed003e92d528049b2b12445c057370e66278166a4e0005ba96
                                                          • Instruction Fuzzy Hash: 4FF054B1640310BEE220A7A17C49F773A5CEB04751F004420FB0CD91A1D6798B5282F8
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: 3, 3, 16, 1
                                                          • API String ID: 176396367-3042988571
                                                          • Opcode ID: 37e5b951eaf50a0f7e34debccb44a6d083bad41796b274c1f5f677d0e314550e
                                                          • Instruction ID: d8b50a33ec9524ef5f72f4682182af5cf1362b8ede9105729b58e483d968d7e4
                                                          • Opcode Fuzzy Hash: 37e5b951eaf50a0f7e34debccb44a6d083bad41796b274c1f5f677d0e314550e
                                                          • Instruction Fuzzy Hash: BCE02B0221422012923212799CC197F56D9CFE9750710182BFA89C23A6FB948D9193A1
                                                          APIs
                                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 001B0B23
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Message
                                                          • String ID: AutoIt$Error allocating memory.
                                                          • API String ID: 2030045667-4017498283
                                                          • Opcode ID: 7cff0a2107ba497ac92726ea5889c3c8b57d8d1806037835608c77d1c8eb0213
                                                          • Instruction ID: b522ed2816181fe1fa2d91f2f4153885c91ced9d734d2f32e260b30b0f567427
                                                          • Opcode Fuzzy Hash: 7cff0a2107ba497ac92726ea5889c3c8b57d8d1806037835608c77d1c8eb0213
                                                          • Instruction Fuzzy Hash: A0E0D8312843586BD21437957C03FCD7A848F19F25F20046AFB58994C38BE228A106E9
                                                          APIs
                                                            • Part of subcall function 0016F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00170D71,?,?,?,0015100A), ref: 0016F7CE
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,0015100A), ref: 00170D75
                                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0015100A), ref: 00170D84
                                                          Strings
                                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00170D7F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                          • API String ID: 55579361-631824599
                                                          • Opcode ID: 767e5cc5c23725548c49dff5bea51ddb57795cea1c013934f6da556870e0da2c
                                                          • Instruction ID: 1ecf9bbbeb07ae63412d363eacc90ded98c658e9610da08c45e8baff5d4faca0
                                                          • Opcode Fuzzy Hash: 767e5cc5c23725548c49dff5bea51ddb57795cea1c013934f6da556870e0da2c
                                                          • Instruction Fuzzy Hash: 8FE06D742007818FD3319FF9E94874A7BF1EB18744F00896DE89ACA651EBB0E4868B91
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 0016E3D5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID: 0%"$8%"
                                                          • API String ID: 1385522511-3788803983
                                                          • Opcode ID: 6327a739b9408ed411e364921c35949e7bdaf554e2ddf2df6ae23832d3ba7f46
                                                          • Instruction ID: d619edb0e12bfc303d7e298afb9e4b9e67d831740ed940c398311992d8affb43
                                                          • Opcode Fuzzy Hash: 6327a739b9408ed411e364921c35949e7bdaf554e2ddf2df6ae23832d3ba7f46
                                                          • Instruction Fuzzy Hash: 06E02636810A20FBCA1D975CFE58A8833A1BF18320BD0A268E4028F2D19B3628768644
                                                          APIs
                                                          • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 001C302F
                                                          • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 001C3044
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: Temp$FileNamePath
                                                          • String ID: aut
                                                          • API String ID: 3285503233-3010740371
                                                          • Opcode ID: 3b53b76085a8121009f87d432492e180ab02e1e188c50920210ee1498e0725ba
                                                          • Instruction ID: 410ae1509be0c9d4359b6a238850cdf57ee8c7a2887503001cb1b80c720b5ab3
                                                          • Opcode Fuzzy Hash: 3b53b76085a8121009f87d432492e180ab02e1e188c50920210ee1498e0725ba
                                                          • Instruction Fuzzy Hash: 39D05E7290032867DA20A7E4AC4EFCF7A7CEB05751F0002A1BB55E6091DAB099C5CAD0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: LocalTime
                                                          • String ID: %.3d$X64
                                                          • API String ID: 481472006-1077770165
                                                          • Opcode ID: d6bf02c5a1160943136f4d806227390f76325b91ebe04c43ee7aa0d744fe9dcf
                                                          • Instruction ID: afa0c6353f5650894943ad4bd79274df72d4393c238372b3ec9a200c448fb1b7
                                                          • Opcode Fuzzy Hash: d6bf02c5a1160943136f4d806227390f76325b91ebe04c43ee7aa0d744fe9dcf
                                                          • Instruction Fuzzy Hash: 53D012A9C08509E9CB5496D0EC45AFAB3BCBB1A341F528453FD07D1440D724C559E762
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 001E232C
                                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 001E233F
                                                            • Part of subcall function 001BE97B: Sleep.KERNELBASE ref: 001BE9F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: e649d085abb80793aef17b7c43b1aeeaaa72b0408a2973f2926fa216584a7c30
                                                          • Instruction ID: e57750987ea396fa223f91b42a4b32ff763b37ced48f95a6e1ec01358bf0cdca
                                                          • Opcode Fuzzy Hash: e649d085abb80793aef17b7c43b1aeeaaa72b0408a2973f2926fa216584a7c30
                                                          • Instruction Fuzzy Hash: 8DD0C9363D5350BAE664A7B0DC4FFCBAA549B14B14F044916B645AA1D0CAA0A8868A94
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 001E236C
                                                          • PostMessageW.USER32(00000000), ref: 001E2373
                                                            • Part of subcall function 001BE97B: Sleep.KERNELBASE ref: 001BE9F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 581fda15cc5c104fabd72139bf22147c5faa438d81ea8a6baabc4f134b46b2b8
                                                          • Instruction ID: 1ce3e3fba8c06d0c8eee10c6219fc57525596253e0336a4c8d25ef29e51092d7
                                                          • Opcode Fuzzy Hash: 581fda15cc5c104fabd72139bf22147c5faa438d81ea8a6baabc4f134b46b2b8
                                                          • Instruction Fuzzy Hash: 0DD0C9363D1350BAE664A7B0DC4FFCBA6549B15B14F044916B645AA1D0CAA0B8868A94
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 0018BE93
                                                          • GetLastError.KERNEL32 ref: 0018BEA1
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0018BEFC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1784789230.0000000000151000.00000020.00000001.01000000.00000003.sdmp, Offset: 00150000, based on PE: true
                                                          • Associated: 00000000.00000002.1784771279.0000000000150000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.00000000001EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784849266.0000000000212000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784904133.000000000021C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1784919214.0000000000224000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_150000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorLast
                                                          • String ID:
                                                          • API String ID: 1717984340-0
                                                          • Opcode ID: 86a543253729a9f11f06067ed46e88676fa99409e99810c2cc6f6b52f8227fc4
                                                          • Instruction ID: c697e2697df75e250a9df4318d00ec40c141fbbd990f4732ec6e1962e281821f
                                                          • Opcode Fuzzy Hash: 86a543253729a9f11f06067ed46e88676fa99409e99810c2cc6f6b52f8227fc4
                                                          • Instruction Fuzzy Hash: 5D41FA35608206EFCF25AFA4CCC4ABA7BB5EF42310F154169FA595B1A1DB308E41CF50