Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1524436
MD5:1cc0eec2a3105dbf316fdc0fbaac2bc9
SHA1:5edd2ae6665330de970ac886d99242da9afdc2cd
SHA256:4e0d0b1dfb20de40249c8015e0b85ae809cdea9fe4191101eccf19448511b115
Tags:exeuser-Bitsight
Infos:

Detection

Credential Flusher
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Credential Flusher
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • file.exe (PID: 7632 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 1CC0EEC2A3105DBF316FDC0FBAAC2BC9)
    • taskkill.exe (PID: 7648 cmdline: taskkill /F /IM chrome.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7656 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • chrome.exe (PID: 7712 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7980 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 --field-trial-handle=2356,i,8685252082371654683,15440142383956627020,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 8176 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5372 --field-trial-handle=2356,i,8685252082371654683,15440142383956627020,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7416 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=2356,i,8685252082371654683,15440142383956627020,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: file.exe PID: 7632JoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
    Source: file.exeJoe Sandbox ML: detected
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49742 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49745 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.4:49774 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.4:62750 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007DDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_007DDBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E68EE FindFirstFileW,FindClose,0_2_007E68EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_007E698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007DD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007DD076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007DD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007DD3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007E9642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007E979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_007E9B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_007E5C97
    Source: global trafficTCP traffic: 192.168.2.4:62746 -> 1.1.1.1:53
    Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
    Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.79.208.1
    Source: unknownTCP traffic detected without corresponding DNS query: 178.79.208.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007ECE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_007ECE44
    Source: global trafficHTTP traffic detected: GET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1Host: youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1Host: www.youtube.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
    Source: global trafficHTTP traffic detected: GET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=1552351272&timestamp=1727889851141 HTTP/1.1Host: accounts.youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-wow64: ?0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: iframeReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: NID=518=vqgYLiANKHTkc6WX5XgaDxk4LZpfrK-Sm0UZ5ic_OYQbh3PBc31yZv-MEP4nCOcieycRFHyL-mYtD73GJ5Ej9mGwXeVfAcaPfhiBbrvOBq1gY15oTr9fTaqYH2-GIMUBGpBbuAwSTJiJ-s1UNAdPvIhPBM9dDiRFzeeYK7dX-pYHMfBF19A
    Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=4BOnfg3sDZ1+ln5&MD=7mmXW1cb HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
    Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=4BOnfg3sDZ1+ln5&MD=7mmXW1cb HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
    Source: chromecache_88.4.drString found in binary or memory: _.fq(p)+"/familylink/privacy/notice/embedded?langCountry="+_.fq(p);break;case "PuZJUb":a+="https://www.youtube.com/t/terms?chromeless=1&hl="+_.fq(m);break;case "fxTQxb":a+="https://youtube.com/t/terms?gl="+_.fq(_.oq(c))+"&hl="+_.fq(d)+"&override_hl=1"+(f?"&linkless=1":"");break;case "prAmvd":a+="https://www.google.com/intl/"+_.fq(m)+"/chromebook/termsofservice.html?languageCode="+_.fq(d)+"&regionCode="+_.fq(c);break;case "NfnTze":a+="https://policies.google.com/privacy/google-partners"+(f?"/embedded": equals www.youtube.com (Youtube)
    Source: global trafficDNS traffic detected: DNS query: youtube.com
    Source: global trafficDNS traffic detected: DNS query: www.youtube.com
    Source: global trafficDNS traffic detected: DNS query: www.google.com
    Source: global trafficDNS traffic detected: DNS query: accounts.youtube.com
    Source: global trafficDNS traffic detected: DNS query: play.google.com
    Source: unknownHTTP traffic detected: POST /log?format=json&hasfast=true&authuser=0 HTTP/1.1Host: play.google.comConnection: keep-aliveContent-Length: 519sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"Content-Type: application/x-www-form-urlencoded;charset=UTF-8sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"X-Goog-AuthUser: 0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: */*Origin: https://accounts.google.comX-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: chromecache_87.4.drString found in binary or memory: https://accounts.google.com
    Source: chromecache_87.4.drString found in binary or memory: https://accounts.google.com/TOS?loc=
    Source: file.exe, 00000000.00000002.1699005281.0000000001098000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwd
    Source: chromecache_84.4.drString found in binary or memory: https://apis.google.com/js/api.js
    Source: chromecache_87.4.drString found in binary or memory: https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage
    Source: chromecache_88.4.drString found in binary or memory: https://families.google.com/intl/
    Source: chromecache_84.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/drive_2020q4/v10/192px.svg
    Source: chromecache_84.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/gmail_2020q4/v10/web-48dp/logo_gmail_2020q4_color_2x_web_
    Source: chromecache_84.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/maps/v7/192px.svg
    Source: chromecache_87.4.drString found in binary or memory: https://g.co/recover
    Source: chromecache_88.4.drString found in binary or memory: https://play.google.com/log?format=json&hasfast=true
    Source: chromecache_87.4.drString found in binary or memory: https://play.google.com/work/enroll?identifier=
    Source: chromecache_88.4.drString found in binary or memory: https://play.google/intl/
    Source: chromecache_88.4.drString found in binary or memory: https://policies.google.com/privacy
    Source: chromecache_88.4.drString found in binary or memory: https://policies.google.com/privacy/additional
    Source: chromecache_88.4.drString found in binary or memory: https://policies.google.com/privacy/google-partners
    Source: chromecache_88.4.drString found in binary or memory: https://policies.google.com/technologies/cookies
    Source: chromecache_88.4.drString found in binary or memory: https://policies.google.com/technologies/location-data
    Source: chromecache_88.4.drString found in binary or memory: https://policies.google.com/terms
    Source: chromecache_88.4.drString found in binary or memory: https://policies.google.com/terms/location
    Source: chromecache_88.4.drString found in binary or memory: https://policies.google.com/terms/service-specific
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-email-pin.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-password.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-or-voice-pin.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-pin.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-stop-go-landing-page_1x.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/animation/
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_device.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_pin.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_1x.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_2x.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_darkmode_1x.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/continue_on_your_phone.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_phone_number_verification.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_silent_tap_yes_darkmode.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes_darkmode.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_dark_v2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_v2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_not_ready.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_dark_1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_darkmode_1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_darkmode_1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_created.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_full_house.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_darkmode_1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_darkmode_1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_darkmode_1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_stop.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/personalization_reminders.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/phone_number_sign_in_2x.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_ios_center.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_laptop.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered_darkmode.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_phone.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_ios.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_pulldown.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_tapyes.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/smart_lock_2x.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/usb_key.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/web_and_app_activity.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/who_will_be_using_this_device.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/you_tube_history.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/gmail_ios_authzen.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/paaskey.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_light.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/screenlock.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_ipad.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_nfc.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_usb.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_phone.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_keys.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/loading_spinner_gm.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/progress_spinner_color_20dp_4x.gif
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/success-gm-default_2x.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/apps/signup/resources/custom-email-address.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/images/hpp/shield_security_checkup_green_2x_web_96dp.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_dark_1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_v1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_dark_v1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_v1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_dark_v1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_v1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_confirmation.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_0.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_dark_0.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_dark_2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_dark_2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_dark_2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_dark_2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_dark_3.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_dark_1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_dark_1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_dark_2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_dark_1.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_dark_2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_dark_v2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_v2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set_darkmode.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_v2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_dark_v2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_v2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space_dark.png
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2_dark.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess.svg
    Source: chromecache_84.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess_dark.svg
    Source: chromecache_87.4.drString found in binary or memory: https://support.google.com/accounts?hl=
    Source: chromecache_88.4.drString found in binary or memory: https://support.google.com/accounts?p=new-si-ui
    Source: chromecache_87.4.drString found in binary or memory: https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072
    Source: chromecache_84.4.drString found in binary or memory: https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
    Source: chromecache_87.4.drString found in binary or memory: https://www.google.com
    Source: chromecache_88.4.drString found in binary or memory: https://www.google.com/intl/
    Source: chromecache_84.4.drString found in binary or memory: https://www.gstatic.com/accounts/speedbump/authzen_optin_illustration.gif
    Source: chromecache_84.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/chrome_48dp.png
    Source: chromecache_84.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/googleg_48dp.png
    Source: chromecache_84.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/gsa_48dp.png
    Source: chromecache_84.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/play_prism_48dp.png
    Source: chromecache_84.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/youtube_48dp.png
    Source: chromecache_88.4.drString found in binary or memory: https://www.gstatic.com/images/branding/productlogos/googleg/v6/36px.svg
    Source: chromecache_88.4.drString found in binary or memory: https://www.youtube.com/t/terms?chromeless=1&hl=
    Source: file.exe, 00000000.00000003.1678003373.00000000005B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
    Source: chromecache_88.4.drString found in binary or memory: https://youtube.com/t/terms?gl=
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
    Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
    Source: unknownNetwork traffic detected: HTTP traffic on port 62752 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 62750 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62759
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62750
    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
    Source: unknownNetwork traffic detected: HTTP traffic on port 62748 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
    Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62752
    Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
    Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
    Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 62759 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62747
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62748
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62749
    Source: unknownNetwork traffic detected: HTTP traffic on port 62749 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 62747 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49742 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49745 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.4:49774 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.4:62750 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007EEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_007EEAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007EED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_007EED6A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007EEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_007EEAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007DAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_007DAA57
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00809576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00809576

    System Summary

    barindex
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
    Source: file.exe, 00000000.00000000.1664608483.0000000000832000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_0ae955cd-4
    Source: file.exe, 00000000.00000000.1664608483.0000000000832000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_2b9b836c-8
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_da86bdb6-3
    Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_71711395-f
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007DD5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_007DD5EB
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_007D1201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007DE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_007DE8F6
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007780600_2_00778060
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E20460_2_007E2046
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D82980_2_007D8298
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007AE4FF0_2_007AE4FF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007A676B0_2_007A676B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008048730_2_00804873
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0077CAF00_2_0077CAF0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0079CAA00_2_0079CAA0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0078CC390_2_0078CC39
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007A6DD90_2_007A6DD9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0078B1190_2_0078B119
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007791C00_2_007791C0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007913940_2_00791394
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007917060_2_00791706
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0079781B0_2_0079781B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0078997D0_2_0078997D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007779200_2_00777920
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007919B00_2_007919B0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00797A4A0_2_00797A4A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00791C770_2_00791C77
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00797CA70_2_00797CA7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FBE440_2_007FBE44
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007A9EEE0_2_007A9EEE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00791F320_2_00791F32
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 00790A30 appears 46 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 0078F9F2 appears 31 times
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: classification engineClassification label: mal64.troj.evad.winEXE@34/32@14/7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E37B5 GetLastError,FormatMessageW,0_2_007E37B5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D10BF AdjustTokenPrivileges,CloseHandle,0_2_007D10BF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_007D16C3
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E51CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_007E51CD
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007FA67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_007FA67C
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_007E648E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007742A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_007742A2
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7656:120:WilError_03
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 --field-trial-handle=2356,i,8685252082371654683,15440142383956627020,262144 /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5372 --field-trial-handle=2356,i,8685252082371654683,15440142383956627020,262144 /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=2356,i,8685252082371654683,15440142383956627020,262144 /prefetch:8
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobarsJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 --field-trial-handle=2356,i,8685252082371654683,15440142383956627020,262144 /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5372 --field-trial-handle=2356,i,8685252082371654683,15440142383956627020,262144 /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=2356,i,8685252082371654683,15440142383956627020,262144 /prefetch:8Jump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007742DE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00790A76 push ecx; ret 0_2_00790A89
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0078F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0078F98E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00801C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00801C41
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-95891
    Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.6 %
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007DDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_007DDBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E68EE FindFirstFileW,FindClose,0_2_007E68EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_007E698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007DD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007DD076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007DD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007DD3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007E9642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007E979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_007E9B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_007E5C97
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007742DE
    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007EEAA2 BlockInput,0_2_007EEAA2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007A2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007A2622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007742DE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00794CE8 mov eax, dword ptr fs:[00000030h]0_2_00794CE8
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_007D0B62
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007A2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007A2622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0079083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0079083F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007909D5 SetUnhandledExceptionFilter,0_2_007909D5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00790C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00790C21
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_007D1201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007B2BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_007B2BA5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007DB226 SendInput,keybd_event,0_2_007DB226
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_007F22DA
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_007D0B62
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007D1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_007D1663
    Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
    Source: file.exeBinary or memory string: Shell_TrayWnd
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00790698 cpuid 0_2_00790698
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007E8195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_007E8195
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007CD27A GetUserNameW,0_2_007CD27A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007ABB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_007ABB6F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007742DE

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 7632, type: MEMORYSTR
    Source: file.exeBinary or memory string: WIN_81
    Source: file.exeBinary or memory string: WIN_XP
    Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
    Source: file.exeBinary or memory string: WIN_XPe
    Source: file.exeBinary or memory string: WIN_VISTA
    Source: file.exeBinary or memory string: WIN_7
    Source: file.exeBinary or memory string: WIN_8

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 7632, type: MEMORYSTR
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_007F1204
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007F1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_007F1806
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure2
    Valid Accounts
    1
    Windows Management Instrumentation
    1
    DLL Side-Loading
    1
    Exploitation for Privilege Escalation
    2
    Disable or Modify Tools
    21
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    2
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts1
    Native API
    2
    Valid Accounts
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol21
    Input Capture
    11
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
    Valid Accounts
    2
    Obfuscated Files or Information
    Security Account Manager1
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
    Access Token Manipulation
    1
    DLL Side-Loading
    NTDS16
    System Information Discovery
    Distributed Component Object ModelInput Capture4
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
    Process Injection
    2
    Valid Accounts
    LSA Secrets12
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Virtualization/Sandbox Evasion
    Cached Domain Credentials1
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
    Access Token Manipulation
    DCSync3
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
    Process Injection
    Proc Filesystem1
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1524436 Sample: file.exe Startdate: 02/10/2024 Architecture: WINDOWS Score: 64 34 Yara detected Credential Flusher 2->34 36 Binary is likely a compiled AutoIt script file 2->36 38 Machine Learning detection for sample 2->38 40 AI detected suspicious sample 2->40 7 file.exe 2->7         started        process3 signatures4 42 Binary is likely a compiled AutoIt script file 7->42 44 Found API chain indicative of sandbox detection 7->44 10 chrome.exe 1 7->10         started        13 taskkill.exe 1 7->13         started        process5 dnsIp6 24 192.168.2.4, 138, 443, 49173 unknown unknown 10->24 26 239.255.255.250 unknown Reserved 10->26 15 chrome.exe 10->15         started        18 chrome.exe 10->18         started        20 chrome.exe 6 10->20         started        22 conhost.exe 13->22         started        process7 dnsIp8 28 play.google.com 142.250.184.206, 443, 49761, 49763 GOOGLEUS United States 15->28 30 youtube.com 142.250.184.238, 443, 49732, 49759 GOOGLEUS United States 15->30 32 6 other IPs or domains 15->32

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    file.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://play.google/intl/0%URL Reputationsafe
    https://families.google.com/intl/0%URL Reputationsafe
    https://policies.google.com/technologies/location-data0%URL Reputationsafe
    https://apis.google.com/js/api.js0%URL Reputationsafe
    https://policies.google.com/privacy/google-partners0%URL Reputationsafe
    https://policies.google.com/terms/service-specific0%URL Reputationsafe
    https://g.co/recover0%URL Reputationsafe
    https://policies.google.com/privacy/additional0%URL Reputationsafe
    https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=32850720%URL Reputationsafe
    https://policies.google.com/technologies/cookies0%URL Reputationsafe
    https://policies.google.com/terms0%URL Reputationsafe
    https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=0%URL Reputationsafe
    https://support.google.com/accounts?hl=0%URL Reputationsafe
    https://policies.google.com/terms/location0%URL Reputationsafe
    https://policies.google.com/privacy0%URL Reputationsafe
    https://support.google.com/accounts?p=new-si-ui0%URL Reputationsafe
    https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    youtube-ui.l.google.com
    142.250.185.142
    truefalse
      unknown
      www3.l.google.com
      142.250.184.238
      truefalse
        unknown
        play.google.com
        142.250.184.206
        truefalse
          unknown
          www.google.com
          142.250.186.132
          truefalse
            unknown
            youtube.com
            142.250.184.238
            truefalse
              unknown
              accounts.youtube.com
              unknown
              unknownfalse
                unknown
                www.youtube.com
                unknown
                unknownfalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://play.google.com/log?format=json&hasfast=true&authuser=0false
                    unknown
                    https://www.google.com/favicon.icofalse
                      unknown
                      https://play.google.com/log?hasfast=true&authuser=0&format=jsonfalse
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://play.google/intl/chromecache_88.4.drfalse
                        • URL Reputation: safe
                        unknown
                        https://families.google.com/intl/chromecache_88.4.drfalse
                        • URL Reputation: safe
                        unknown
                        https://youtube.com/t/terms?gl=chromecache_88.4.drfalse
                          unknown
                          https://policies.google.com/technologies/location-datachromecache_88.4.drfalse
                          • URL Reputation: safe
                          unknown
                          https://www.google.com/intl/chromecache_88.4.drfalse
                            unknown
                            https://apis.google.com/js/api.jschromecache_84.4.drfalse
                            • URL Reputation: safe
                            unknown
                            https://policies.google.com/privacy/google-partnerschromecache_88.4.drfalse
                            • URL Reputation: safe
                            unknown
                            https://play.google.com/work/enroll?identifier=chromecache_87.4.drfalse
                              unknown
                              https://policies.google.com/terms/service-specificchromecache_88.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://g.co/recoverchromecache_87.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/privacy/additionalchromecache_88.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072chromecache_87.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/technologies/cookieschromecache_88.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/termschromecache_88.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=chromecache_84.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://www.google.comchromecache_87.4.drfalse
                                unknown
                                https://play.google.com/log?format=json&hasfast=truechromecache_88.4.drfalse
                                  unknown
                                  https://www.youtube.com/t/terms?chromeless=1&hl=chromecache_88.4.drfalse
                                    unknown
                                    https://support.google.com/accounts?hl=chromecache_87.4.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://policies.google.com/terms/locationchromecache_88.4.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://policies.google.com/privacychromecache_88.4.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://support.google.com/accounts?p=new-si-uichromecache_88.4.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessagechromecache_87.4.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    172.217.18.4
                                    unknownUnited States
                                    15169GOOGLEUSfalse
                                    239.255.255.250
                                    unknownReserved
                                    unknownunknownfalse
                                    142.250.185.142
                                    youtube-ui.l.google.comUnited States
                                    15169GOOGLEUSfalse
                                    142.250.186.132
                                    www.google.comUnited States
                                    15169GOOGLEUSfalse
                                    142.250.184.238
                                    www3.l.google.comUnited States
                                    15169GOOGLEUSfalse
                                    142.250.184.206
                                    play.google.comUnited States
                                    15169GOOGLEUSfalse
                                    IP
                                    192.168.2.4
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1524436
                                    Start date and time:2024-10-02 19:23:09 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 4m 52s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:12
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:file.exe
                                    Detection:MAL
                                    Classification:mal64.troj.evad.winEXE@34/32@14/7
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 96%
                                    • Number of executed functions: 39
                                    • Number of non-executed functions: 311
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 142.250.184.227, 216.58.206.46, 66.102.1.84, 34.104.35.123, 172.217.23.99, 142.250.186.163, 142.250.185.234, 142.250.186.170, 142.250.184.234, 172.217.18.10, 142.250.185.138, 172.217.16.202, 142.250.185.202, 142.250.186.42, 142.250.181.234, 142.250.185.170, 142.250.186.74, 142.250.186.106, 142.250.184.202, 142.250.185.106, 216.58.212.170, 216.58.206.42, 172.217.18.106, 142.250.74.202, 216.58.206.74, 172.217.23.106, 142.250.186.138, 93.184.221.240, 192.229.221.95, 74.125.71.84, 142.250.186.78
                                    • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, content-autofill.googleapis.com, slscr.update.microsoft.com, fonts.gstatic.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, update.googleapis.com, clients.l.google.com, www.gstatic.com, optimizationguide-pa.googleapis.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                    • VT rate limit hit for: file.exe
                                    No simulations
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    239.255.255.250https://kfdsh.org/frrgde?e=Get hashmaliciousUnknownBrowse
                                      file.exeGet hashmaliciousUnknownBrowse
                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                    file.exeGet hashmaliciousUnknownBrowse
                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                        No context
                                                        No context
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        28a2c9bd18a11de089ef85a160da29e4https://kfdsh.org/frrgde?e=Get hashmaliciousUnknownBrowse
                                                        • 184.28.90.27
                                                        • 20.12.23.50
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 184.28.90.27
                                                        • 20.12.23.50
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 184.28.90.27
                                                        • 20.12.23.50
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 184.28.90.27
                                                        • 20.12.23.50
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 184.28.90.27
                                                        • 20.12.23.50
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 184.28.90.27
                                                        • 20.12.23.50
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 184.28.90.27
                                                        • 20.12.23.50
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 184.28.90.27
                                                        • 20.12.23.50
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 184.28.90.27
                                                        • 20.12.23.50
                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                        • 184.28.90.27
                                                        • 20.12.23.50
                                                        No context
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (468)
                                                        Category:downloaded
                                                        Size (bytes):1858
                                                        Entropy (8bit):5.298162049824456
                                                        Encrypted:false
                                                        SSDEEP:48:o7vGoolL3ALFKphnpiu7xOKAcfO/3d/rYh4vZorw:o/QLUFUL4KA+2y0Mw
                                                        MD5:CE055F881BDAB4EF6C1C8AA4B3890348
                                                        SHA1:2671741A70E9F5B608F690AAEEA4972003747654
                                                        SHA-256:9B91C23691D6032CDFE28863E369624B2EDB033E1487A1D1BB0977E3590E5462
                                                        SHA-512:8A22250628985C2E570E6FBADFC0D5CB6753F0735130F9E74962A409476C2859C5C81F8A0F5C427A9F13ED399C8E251FA43FF67AD5F16860640D45E7A538E857
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,ZwDk9d,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=iAskyc,ziXSP"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("iAskyc");._.QZ=function(a){_.W.call(this,a.Fa);this.window=a.Ea.window.get();this.Nc=a.Ea.Nc};_.J(_.QZ,_.W);_.QZ.Ba=function(){return{Ea:{window:_.qu,Nc:_.DE}}};_.QZ.prototype.Po=function(){};_.QZ.prototype.addEncryptionRecoveryMethod=function(){};_.RZ=function(a){return(a==null?void 0:a.Jo)||function(){}};_.SZ=function(a){return(a==null?void 0:a.m3)||function(){}};_.GPb=function(a){return(a==null?void 0:a.Op)||function(){}};._.HPb=function(a){return new Map(Array.from(a,function(b){var c=_.n(b);b=c.next().value;c=c.next().value;return[b,c.map(function(d){return{epoch:d.epoch,key:new Uint8Array(d.key)}})]}))};_.IPb=function(a){setTimeout(function(){throw a;},0)};_.QZ.prototype.kO=function(){return!0};_.nu(_.An,_.QZ);._.l();._.k("ziXSP");.var j_=function(a){_.QZ.call(this,a.Fa)};_.J(j_,_.QZ);j_.Ba=_.QZ.Ba;j_.prototype.Po=function(a,b,c){var d;if((d=this.window.chrome)==nu
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                                        Category:downloaded
                                                        Size (bytes):5430
                                                        Entropy (8bit):3.6534652184263736
                                                        Encrypted:false
                                                        SSDEEP:48:wIJct3xIAxG/7nvWDtZcdYLtX7B6QXL3aqG8Q:wIJct+A47v+rcqlBPG9B
                                                        MD5:F3418A443E7D841097C714D69EC4BCB8
                                                        SHA1:49263695F6B0CDD72F45CF1B775E660FDC36C606
                                                        SHA-256:6DA5620880159634213E197FAFCA1DDE0272153BE3E4590818533FAB8D040770
                                                        SHA-512:82D017C4B7EC8E0C46E8B75DA0CA6A52FD8BCE7FCF4E556CBDF16B49FC81BE9953FE7E25A05F63ECD41C7272E8BB0A9FD9AEDF0AC06CB6032330B096B3702563
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        URL:https://www.google.com/favicon.ico
                                                        Preview:............ .h...&... .... .........(....... ..... ............................................0...................................................................................................................................v.].X.:.X.:.r.Y........................................q.X.S.4.S.4.S.4.S.4.S.4.S.4...X....................0........q.W.S.4.X.:.................J...A...g.........................K.H.V.8..........................F..B.....................,.......................................B..............................................B..B..B..B..B...u..........................................B..B..B..B..B...{.................5.......k...........................................................7R..8F.................................................2........Vb..5C..;I..................R^.....................0................Xc..5C..5C..5C..5C..5C..5C..lv..........................................]i..<J..:G..Zf....................................................
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (683)
                                                        Category:downloaded
                                                        Size (bytes):3131
                                                        Entropy (8bit):5.355381206612617
                                                        Encrypted:false
                                                        SSDEEP:48:o7FEEM3MtH15jNQ8jsK3rnw0dkckTrKEp/OqLE9xz0W5Bzv3M6hIHYA+JITbwrF8:oq675jOArwoAmI/DLaxNPL5m+m6w
                                                        MD5:E2A7251AD83A0D0634FEA2703D10ED07
                                                        SHA1:90D72011F31FC40D3DA3748F2817F90A29EB5C01
                                                        SHA-256:1079B49C4AAF5C10E4F2E6A086623F40D200A71FF2A1F64E88AA6C91E4BE7A6F
                                                        SHA-512:CD6D75580EA8BD97CF7C7C0E0BD9D9A54FB6EA7DF1DDB5A95E94D38B260F9EE1425C640839ECD229B8D01E145CF2786CA374D31EC537EB8FE17FF415D5B985F5
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ZwDk9d,RMhBfe"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("ZwDk9d");.var gA=function(a){_.W.call(this,a.Fa)};_.J(gA,_.W);gA.Ba=_.W.Ba;gA.prototype.eS=function(a){return _.Xe(this,{Xa:{gT:_.ll}}).then(function(b){var c=window._wjdd,d=window._wjdc;return!c&&d?new _.li(function(e){window._wjdc=function(f){d(f);e(ZJa(f,b,a))}}):ZJa(c,b,a)})};var ZJa=function(a,b,c){return(a=a&&a[c])?a:b.Xa.gT.eS(c)};.gA.prototype.aa=function(a,b){var c=_.Zra(b).Rj;if(c.startsWith("$")){var d=_.gm.get(a);_.uq[b]&&(d||(d={},_.gm.set(a,d)),d[c]=_.uq[b],delete _.uq[b],_.vq--);if(d)if(a=d[c])b=_.af(a);else throw Error("Jb`"+b);else b=null}else b=null;return b};_.nu(_.Lfa,gA);._.l();._.k("SNUn3");._.YJa=new _.pf(_.wg);._.l();._.k("RMhBfe");.var $Ja=function(a){var b=_.tq(a);return b?new _.li(function(c,d){var e=function(){b=_.tq(a);var f=_.Sfa(a,b);f?c(f.getAttribute("jsdata")):window.document.readyState=="complete"?(f=["Unable to find deferred jsdata wit
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (395)
                                                        Category:downloaded
                                                        Size (bytes):1652
                                                        Entropy (8bit):5.269909938363071
                                                        Encrypted:false
                                                        SSDEEP:48:o72ZrNZDuZW4yNAbU+15fMxIdf5WENoBCbw7DbG2bEJrw:oyRuZMNAY+1i4HoBNG2Ilw
                                                        MD5:63E5B24335CCDC457DD0B69AD1891CF9
                                                        SHA1:8DD3AED0737BEDBEE133BA564D3CA43579A138F7
                                                        SHA-256:FB72BE79F85659D5AF831FD644C4702EA5BFC6E6A90CDB156DE0816B179278C0
                                                        SHA-512:EC3A143FED571A7FC490433F11DDBD66752E42F0BAC476F79F9B8310DB0419CAE2B8CD65F1283D590F5979F4CC1FB8B2610F106BF38E0B93F384201B8BF5E5DA
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=xUdipf,OTA3Ae,A1yn5d,fKUV3e,aurFic,Ug7Xab,NwH0H,OmgaI,gychg,w9hDv,EEDORb,Mlhmy,ZfAoz,kWgXee,ovKuLd,yDVVkb,ebZ3mb,ZDZcre,A7fCU"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("w9hDv");._.vg(_.Hla);_.eA=function(a){_.W.call(this,a.Fa);this.aa=a.Xa.cache};_.J(_.eA,_.W);_.eA.Ba=function(){return{Xa:{cache:_.dt}}};_.eA.prototype.execute=function(a){_.Bb(a,function(b){var c;_.$e(b)&&(c=b.eb.kc(b.kb));c&&this.aa.xG(c)},this);return{}};_.nu(_.Nla,_.eA);._.l();._.k("lOO0Vd");._.VZa=new _.pf(_.Am);._.l();._.k("ZDZcre");.var fH=function(a){_.W.call(this,a.Fa);this.Wl=a.Ea.Wl;this.d4=a.Ea.metadata;this.aa=a.Ea.ot};_.J(fH,_.W);fH.Ba=function(){return{Ea:{Wl:_.KG,metadata:_.VZa,ot:_.HG}}};fH.prototype.execute=function(a){var b=this;a=this.aa.create(a);return _.Bb(a,function(c){var d=b.d4.getType(c.Od())===2?b.Wl.Rb(c):b.Wl.fetch(c);return _.yl(c,_.LG)?d.then(function(e){return _.Dd(e)}):d},this)};_.nu(_.Sla,fH);._.l();._.k("K5nYTd");._.UZa=new _.pf(_.Ola);._.l();._.k("sP4Vbe");.._.l();._.k("kMFpHd");.._.l();._.k("A7fCU");.var NG=function(a){_.W.call(this,a
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (2907)
                                                        Category:downloaded
                                                        Size (bytes):22833
                                                        Entropy (8bit):5.425034548615223
                                                        Encrypted:false
                                                        SSDEEP:384:7lFo6ZEdpgtmyiPixV9OX9gMBpHkHnfst9lZulagGcwYHiRFjJzN7:77o6ZviPixV8xpEHn89l4IgGcwYCRtb7
                                                        MD5:749B18538FE32BFE0815D75F899F5B21
                                                        SHA1:AF95A019211AF69F752A43CAA54A83C2AFD41D28
                                                        SHA-256:116B2687C1D5E00DB56A79894AB0C12D4E2E000B9379B7E7AD751B84DF611F3F
                                                        SHA-512:E4B6F4556AA0FD9979BB52681508F5E26FFB256473803F74F7F5C8D93FA3636D7D0A5835618FBC6123022805CE0D9616A7451A0F302C665E28A6090B5D588505
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=RqjULd"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.uu.prototype.da=_.ca(40,function(){return _.rj(this,3)});_.$y=function(a,b){this.key=a;this.defaultValue=!1;this.flagName=b};_.$y.prototype.ctor=function(a){return typeof a==="boolean"?a:this.defaultValue};_.az=function(){this.ka=!0;var a=_.vj(_.dk(_.Be("TSDtV",window),_.zya),_.uu,1,_.qj())[0];if(a){var b={};for(var c=_.n(_.vj(a,_.Aya,2,_.qj())),d=c.next();!d.done;d=c.next()){d=d.value;var e=_.Jj(d,1).toString();switch(_.tj(d,_.vu)){case 3:b[e]=_.Hj(d,_.lj(d,_.vu,3));break;case 2:b[e]=_.Jj(d,_.lj(d,_.vu,2));break;case 4:b[e]=_.Kj(d,_.lj(d,_.vu,4));break;case 5:b[e]=_.Lj(d,_.lj(d,_.vu,5));break;case 6:b[e]=_.Pj(d,_.ff,6,_.vu);break;default:throw Error("jd`"+_.tj(d,_.vu));}}}else b={};this.ea=b;this.token=.a?a.da():null};_.az.prototype.aa=function(a){if(!this.ka||a.key in this.ea)a=a.ctor(this.ea[a.key]);else if(_.Be("nQyAE",window)){var b=_.Cya(a.flagName);if(b===null)a=a.de
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
                                                        Category:downloaded
                                                        Size (bytes):52280
                                                        Entropy (8bit):7.995413196679271
                                                        Encrypted:true
                                                        SSDEEP:1536:1rvqtK8DZilXxwJ8mMwAZy7phqsFLdG3B4d:xytBZits8bw4wzbFxG3B4d
                                                        MD5:F61F0D4D0F968D5BBA39A84C76277E1A
                                                        SHA1:AA3693EA140ECA418B4B2A30F6A68F6F43B4BEB2
                                                        SHA-256:57147F08949ABABE7DEEF611435AE418475A693E3823769A25C2A39B6EAD9CCC
                                                        SHA-512:6C3BD90F709BCF9151C9ED9FFEA55C4F6883E7FDA2A4E26BF018C83FE1CFBE4F4AA0DB080D6D024070D53B2257472C399C8AC44EEFD38B9445640EFA85D5C487
                                                        Malicious:false
                                                        URL:https://fonts.gstatic.com/s/googlesans/v58/4UaRrENHsxJlGDuGo1OIlJfC6l_24rlCK1Yo_Iq2vgCI.woff2
                                                        Preview:wOF2.......8.....................................^...$..4?HVAR..?MVAR9.`?STAT.*',..J/.......`..(..Z.0..R.6.$.... .....K..[..q..c..T.....>.P.j.`.w..#...%......N.".....$..3.0.6......... .L.rX/r[j.y.|*(.4.%#.....2.v.m..-..%.....;-.Y.{..&..O=#l@...k..7g..ZI...#.Z./+T..r7...M..3).Z%.x....s..sL..[A!.5*1w'/.8V..2Z..%.X.h.o.).]..9..Q`.$.....7..kZ.~O........d..g.n.d.Rw+&....Cz..uy#..fz,(.J....v.%..`..9.....h...?O..:...c%.....6s....xl..#...5..._......1.>.)"U.4 W....?%......6//!$...!.n9C@n...........!""^.....W..Z<.7.x.."UT.T....E.."R>.R..t.....H d..e_.K../.+8.Q.P.ZQ....;...U....]......._.e*......71.?.7.ORv.?...l...G|.P...|:...I.X..2.,.L........d.g.]}W#uW]QnuP-s.;.-Y.....].......C..j_.M0...y.......J..........NY..@A...,....-.F......'..w./j5g.vUS...U..0.&...y7.LP.....%.....Y......Y..D. e.A..G.?.$.......6...eaK.n5.m...N...,...+BCl..L> .E9~.b[.w.x....6<...}.e...%V....O.......*.?...a..#[eE.4..p..$...].....%......o._......N.._~..El....b..A.0.r8.....|..D.d..
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (533)
                                                        Category:downloaded
                                                        Size (bytes):9210
                                                        Entropy (8bit):5.404371326611379
                                                        Encrypted:false
                                                        SSDEEP:192:EEFZpeip4HzZlY0If0Ma23jcUcrhCx6VD1TYPi8:Es/p4jgjUhtD1TY68
                                                        MD5:21E893B65627B397E22619A9F5BB9662
                                                        SHA1:F561B0F66211C1E7B22F94B4935C312AB7087E85
                                                        SHA-256:FFA9B8BC8EF2CDFF5EB4BA1A0BA1710A253A5B42535E2A369D5026967DCF4673
                                                        SHA-512:3DE3CD6A4E9B06AB3EB324E90A40B5F2AEEA8D7D6A2651C310E993CF79EEB5AC6E2E33C587F46B2DD20CC862354FD1A61AEBB9B990E6805F6629404BA285F8FA
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,CMcBD,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,byfTOb,cYShmd,eVCnO,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,qPfo0c,qmdT9,rCcCxc,siKnQd,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ltDFwf,SD8Jgb,rmumx,E87wgc,qPYxq,Tbb4sb,pxq3x,f8Gu1e,soHxf,YgOFye,yRXbo,bTi8wc,ywOR5c,PHUIyb"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.qNa=_.y("SD8Jgb",[]);._.GX=function(a,b){if(typeof b==="string")a.Lc(b);else if(b instanceof _.Fp&&b.ia&&b.ia===_.A)b=_.Ya(b.Lw()),a.empty().append(b);else if(b instanceof _.Ua)b=_.Ya(b),a.empty().append(b);else if(b instanceof Node)a.empty().append(b);else throw Error("Vf");};_.HX=function(a){var b=_.Io(a,"[jsslot]");if(b.size()>0)return b;b=new _.Go([_.Kk("span")]);_.Jo(b,"jsslot","");a.empty().append(b);return b};_.NLb=function(a){return a===null||typeof a==="string"&&_.Hi(a)};._.k("SD8Jgb");._.MX=function(a){_.X.call(this,a.Fa);this.Ua=a.controller.Ua;this.od=a.controllers.od[0]||null;this.header=a.controller.header;this.nav=a.controller.nav;var b;(b=this.oa().find("button:not([type])").el())==null||b.setAttribute("type","button")};_.J(_.MX,_.X);_.MX.Ba=function(){return{controller:{Ua:{jsname:"n7vHCb",ctor:_.mv},header:{jsname:"tJHJj",ctor:_.mv},nav:{jsname:"DH6Rkf",ct
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (553)
                                                        Category:downloaded
                                                        Size (bytes):743936
                                                        Entropy (8bit):5.791086230020914
                                                        Encrypted:false
                                                        SSDEEP:6144:YVXWBQkPdzg5pTX1ROv/duPzd8C3s891/N:Nfd8j91/N
                                                        MD5:1A3606C746E7B1C949D9078E8E8C1244
                                                        SHA1:56A3EB1E93E61ACD7AAD39DC3526CB60E23651B1
                                                        SHA-256:5F49AE5162183E2EF6F082B29EC99F18DB0212B8ADDB03699B1BFB0AC7869742
                                                        SHA-512:F2D15243311C472331C5F3F083BB6C18D38EC0247A3F3CBAFD96DBA40E4EAE489CDA04176672E39FE3760EF7347596B2A5EAB0FB0125E881EF514475C99863B9
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/excm=_b,_tp,identifierview/ed=1/dg=0/wt=2/ujg=1/rs=AOaEmlE6O04h0gj7Nu50q-nmaRKM6WWcJw/m=_b,_tp"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([0x286081c4, 0x2046d860, 0x39e13c40, 0x14501e80, 0xe420, 0x0, 0x1a000000, 0x1d000003, 0xc, ]);./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright 2024 Google, Inc. SPDX-License-Identifier: MIT.*/./*. SPDX-License-Identifier: Apache-2.0.*/./*. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var baa,daa,Ma,Sa,gaa,iaa,jb,qaa,waa,Caa,Haa,Kaa,Jb,Laa,Ob,Qb,Rb,Maa,Naa,Sb,Oaa,Paa,Qaa,Yb,Vaa,Xaa,ec,fc,gc,bba,cba,gba,jba,lba,mba,qba,tba,nba,sba,rba,pba,oba,uba,yba,Cba,Dba,Aba,Hc,Ic,Gba,Iba,Mba,Nba,Oba,Pba,Lba,Qba,Sba,dd,Uba,Vba,Xba,Zba,Yba,aca,bca,cca,dca,fca,eca,hca,ica,jca,kca,nca,
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (755)
                                                        Category:downloaded
                                                        Size (bytes):1416
                                                        Entropy (8bit):5.275155058463166
                                                        Encrypted:false
                                                        SSDEEP:24:kMYD7hqCsNRxoYTY9/qoVk7hz1l2p6vDMW94uEQOeGbCx4VGbgCSFBV87O/BprGJ:o7hv6oy12kvwKEeGbC6GbHSh/Hrw
                                                        MD5:4DB6842CDFAC9E03D7C1CF87E398B357
                                                        SHA1:08158AB8F5947E048C88A1289E9E8CE9641B7CE9
                                                        SHA-256:8991D23B586608AE114E150355FF192B30A379EAB1DC3F1444109DDC52B13AC1
                                                        SHA-512:FB7C461DFB96B10E099C3BA41C45AA904BB7D473EF0D44BD6A2E841BC44336DD5F1C9B73919B79A6BF4AA13B806E742F2003A16528E995374E210BB4C3E96EFA
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,ZwDk9d,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=P6sQOc"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("P6sQOc");.var $Za=!!(_.Kh[1]&16);var b_a=function(a,b,c,d,e){this.ea=a;this.wa=b;this.ka=c;this.Ca=d;this.Ga=e;this.aa=0;this.da=a_a(this)},c_a=function(a){var b={};_.La(a.yS(),function(e){b[e]=!0});var c=a.pS(),d=a.tS();return new b_a(a.qP(),c.aa()*1E3,a.WR(),d.aa()*1E3,b)},a_a=function(a){return Math.random()*Math.min(a.wa*Math.pow(a.ka,a.aa),a.Ca)},OG=function(a,b){return a.aa>=a.ea?!1:b!=null?!!a.Ga[b]:!0};var PG=function(a){_.W.call(this,a.Fa);this.da=a.Ea.EV;this.ea=a.Ea.metadata;a=a.Ea.Xga;this.fetch=a.fetch.bind(a)};_.J(PG,_.W);PG.Ba=function(){return{Ea:{EV:_.YZa,metadata:_.VZa,Xga:_.OZa}}};PG.prototype.aa=function(a,b){if(this.ea.getType(a.Od())!==1)return _.Sm(a);var c=this.da.eV;return(c=c?c_a(c):null)&&OG(c)?_.wya(a,d_a(this,a,b,c)):_.Sm(a)};.var d_a=function(a,b,c,d){return c.then(function(e){return e},function(e){if($Za)if(e instanceof _.lf){if(!e.status||
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:HTML document, ASCII text, with very long lines (681)
                                                        Category:downloaded
                                                        Size (bytes):4066
                                                        Entropy (8bit):5.363016925556486
                                                        Encrypted:false
                                                        SSDEEP:96:G2CiFZX5BReR68ujioIRVrqtyzBeTV6SfyAKLif9c7w:bCMZXVeR6jiosVrqtyzBaImyAKw9x
                                                        MD5:FC5E597D923838E10390DADD12651A81
                                                        SHA1:C9959F8D539DB5DF07B8246EC12539B6A9CC101F
                                                        SHA-256:A7EBD5280C50AE93C061EAE1E9727329E015E97531F8F2D82D0E3EA76ADB37B4
                                                        SHA-512:784CA572808F184A849388723FBB3701E6981D885BBA8A330A933F90BF0B36A2E4A491D4463A27911B1D9F7A7134F23E15F187FC7CB4554EAE9BC252513EED7C
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZakeSe,ZfAoz,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=sOXFj,q0xTif,ZZ4WUe"
                                                        Preview:"use strict";_F_installCss(".N7rBcd{overflow-x:auto}sentinel{}");.this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.vg(_.aqa);._.k("sOXFj");.var tu=function(a){_.W.call(this,a.Fa)};_.J(tu,_.W);tu.Ba=_.W.Ba;tu.prototype.aa=function(a){return a()};_.nu(_.$pa,tu);._.l();._.k("oGtAuc");._.yya=new _.pf(_.aqa);._.l();._.k("q0xTif");.var sza=function(a){var b=function(d){_.Sn(d)&&(_.Sn(d).Jc=null,_.Du(d,null));d.XyHi9&&(d.XyHi9=null)};b(a);a=a.querySelectorAll("[c-wiz]");for(var c=0;c<a.length;c++)b(a[c])},Pu=function(a){_.kt.call(this,a.Fa);this.Qa=this.dom=null;if(this.kl()){var b=_.zm(this.Ug(),[_.Em,_.Dm]);b=_.ni([b[_.Em],b[_.Dm]]).then(function(c){this.Qa=c[0];this.dom=c[1]},null,this);_.hu(this,b)}this.Ra=a.lm.zea};_.J(Pu,_.kt);Pu.Ba=function(){return{lm:{zea:function(a){return _.Ue(a)}}}};Pu.prototype.zp=function(a){return this.Ra.zp(a)};.Pu.prototype.getData=function(a){return this.Ra.getData(a)};Pu.prototype.qo=function(){_.Kt(this.d
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (2544)
                                                        Category:downloaded
                                                        Size (bytes):358799
                                                        Entropy (8bit):5.624587482410481
                                                        Encrypted:false
                                                        SSDEEP:6144:T/wM8RGYcBlKmhCxiDlnc0pYMSrBg5X3rU:TD8XxEdA
                                                        MD5:A51DFF6CB98C15CBA0A2B688CC0A862F
                                                        SHA1:5CF15DBD322A0F9CF3A820013E185EC2EDD56BB0
                                                        SHA-256:854215C9FE46B6029883F37C44512F7EB10BA97FC7A623C237DC6824BD92DB1E
                                                        SHA-512:D1036F2C4AE71BE22315D5AEC062E1D59EA2570D7138B97F367149C9622BEE35EAC1DBE9818AC7BE107D88683089EBE220951D025CC11908055B108B27D7BD86
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=AvtSve,EFQ78c,EIOG1e,GwYlN,I6YDgd,IZT63,K0PMbc,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,bSspM,byfTOb,cYShmd,eVCnO,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,lwddkf,m9oV,mzzZzc,n73qwf,njlZCf,oLggrd,qPfo0c,qmdT9,rCcCxc,siKnQd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,y5vRwf,zbML3c,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=K1ZKnb,ziZ8Mc,b3kMqb,mvkUhe,CMcBD,Fndnac,t2srLd,EN3i8d,z0u0L,xiZRqc"
                                                        Preview:"use strict";_F_installCss(".r4WGQb{position:relative}.Dl08I>:first-child{margin-top:0}.Dl08I>:last-child{margin-bottom:0}.IzwVE{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-family:\"Google Sans\",roboto,\"Noto Sans Myanmar UI\",arial,sans-serif;font-size:1.25rem;font-weight:400;letter-spacing:0rem;line-height:1.2}.l5PPKe{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-size:1rem}.l5PPKe .dMNVAe{margin:0;padding:0}.l5PPKe>:first-child{margin-top:0;padding-top:0}.l5PPKe>:last-child{margin-bottom:0;padding-bottom:0}.Dl08I{margin:0;padding:0;position:relative}.Dl08I>.SmR8:only-child{padding-top:1px}.Dl08I>.SmR8:only-child::before{top:0}.Dl08I>.SmR8:not(first-child){padding-bottom:1px}.Dl08I>.SmR8::after{bottom:0}.Dl08I>.SmR8:only-child::before,.Dl08I>.SmR8::after{border-bottom:1px solid #c4c7c5;border-bottom:1px solid var(--gm3-sys-color-outline-variant,#c4c7c5);content:\"\";height:0;left:0;position:absolute;width:100%}.aZvCDf{margin-top:8px;margin-left
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (3190)
                                                        Category:downloaded
                                                        Size (bytes):339747
                                                        Entropy (8bit):5.53363647964667
                                                        Encrypted:false
                                                        SSDEEP:3072:Vuv7kVKtaVFuzDXG6ZfzeelpRv9xqjne01T2HemAIaDlC6diGVOY50UlRQQIBeDq:svaKtM6ZfTxene0F2HemAaGP6BBe2
                                                        MD5:D2D05D80ACF53F04C1BEB6A387216F5E
                                                        SHA1:6E8B87D352419E28C5F8E3881787DC6C56CEB26E
                                                        SHA-256:4BA0D4EA27446C609D515539A334E3B16A4AC7BF936A996CF7E3927FFDDD569F
                                                        SHA-512:966582697B455B2DDC52210A0F46EFD77EDC67D668E7FC2F14E18DF38E8595472AB76ED17B9D2928E16FA987E3231C2A45D9BD52D9DC2CE7E4C394E2453518E6
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=LEikZe,_b,_tp,byfTOb,lsjVmc/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=n73qwf,SCuOPb,IZT63,vfuNJf,UUJqVe,ws9Tlc,siKnQd,XVq9Qb,STuCOe,njlZCf,m9oV,vjKJJ,y5vRwf,iyZMqd,NTMZac,mzzZzc,rCcCxc,vvMGie,NOeYWe,O6y8ed,L9OGUe,PrPYRd,MpJwZc,qPfo0c,cYShmd,hc6Ubd,Rkm0ef,KUM7Z,oLggrd,inNHtf,L1AAkb,WpP9Yc,lwddkf,gJzDyc,SpsfSb,aC1iue,tUnxGc,aW3pY,ZakeSe,EFQ78c,xQtZb,I6YDgd,zbML3c,zr1jrb,vHEMJe,YHI3We,YTxL4,bSspM,Uas9Hd,zy0vNb,K0PMbc,AvtSve,qmdT9,MY7mZe,xBaz7b,GwYlN,eVCnO,EIOG1e,LDQI"
                                                        Preview:"use strict";_F_installCss(".EE6QGf{border-bottom-style:solid;border-bottom-width:1px;padding:16px;width:100%;z-index:6;background:#fff;background:var(--gm3-sys-color-surface-container-lowest,#fff);border-color:#c4c7c5;border-color:var(--gm3-sys-color-outline-variant,#c4c7c5);display:block;position:relative}.EE6QGf~.S7xv8,.EE6QGf~.gfM9Zd{padding-top:inherit}@media (min-width:600px){.EE6QGf{align-items:center;display:flex;left:0;position:fixed;top:0}.EE6QGf~.S7xv8,.EE6QGf~.gfM9Zd{padding-top:150px}}@media (min-width:600px) and (orientation:landscape){.EE6QGf{display:block;position:relative}.EE6QGf~.S7xv8,.EE6QGf~.gfM9Zd{padding-top:inherit}}@media (min-width:960px) and (orientation:landscape){.EE6QGf{align-items:center;display:flex;left:0;position:fixed;top:0}.EE6QGf~.S7xv8,.EE6QGf~.gfM9Zd{padding-top:150px}}.PZB4Lc{display:flex;width:100%}.YLIzab{font-family:\"Google Sans\",roboto,\"Noto Sans Myanmar UI\",arial,sans-serif;font-size:1rem;font-weight:500;letter-spacing:0rem;line-height:1
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:downloaded
                                                        Size (bytes):84
                                                        Entropy (8bit):4.875266466142591
                                                        Encrypted:false
                                                        SSDEEP:3:DZFJu0+WVTBCq2Bjdw2KsJJuYHSKnZ:lFJuuVTBudw29nu4SKZ
                                                        MD5:87B6333E98B7620EA1FF98D1A837A39E
                                                        SHA1:105DE6815B0885357DE1414BFC0D77FCC9E924EF
                                                        SHA-256:DCD3C133C5C40BECD4100BBE6EDAE84C9735E778E4234A5E8395C56FF8A733BA
                                                        SHA-512:867D7943D813685FAA76394E53199750C55817E836FD19C933F74D11E9657CE66719A6D6B2E39EE1DE62358BCE364E38A55F4E138DF92337DE6985DDCD5D0994
                                                        Malicious:false
                                                        URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISHgmA6QC9dWevzxIFDRkBE_oSBQ3oIX6GEgUN05ioBw==?alt=proto
                                                        Preview:Cj0KBw0ZARP6GgAKKQ3oIX6GGgQISxgCKhwIClIYCg5AIS4jJF8qLSY/Ky8lLBABGP////8PCgcN05ioBxoA
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (522)
                                                        Category:downloaded
                                                        Size (bytes):5050
                                                        Entropy (8bit):5.289052544075544
                                                        Encrypted:false
                                                        SSDEEP:96:o4We0hP7OBFXYvB1sig3Fd8HkaXzLmUrv8Vh1WJlLQXT2v2gqw:655758Fd8HkaPZ0GmAD
                                                        MD5:26E26FD11772DFF5C7004BEA334289CC
                                                        SHA1:638DAAF541BDE31E95AEE4F8ADA677434D7051DB
                                                        SHA-256:ADFE3E4960982F5EF4C043052A9990D8683C5FC2B590E817B6B1A5774DDE2CE3
                                                        SHA-512:C31929EB6D1C60D6A84A2574FF60490394A6D6F9B354972F3328952F570D80B3F2AEC916B0E1B66DDB1AC056EB75BFAC477E7AF631D0AD1810EDBAF025465D66
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,ZwDk9d,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,iAskyc,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=wg1P6b"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.jNa=_.y("wg1P6b",[_.TA,_.Cn,_.Kn]);._.k("wg1P6b");.var Z5a;Z5a=_.mh(["aria-"]);._.uJ=function(a){_.X.call(this,a.Fa);this.Ka=this.wa=this.aa=this.viewportElement=this.Na=null;this.Hc=a.Ea.ff;this.ab=a.Ea.focus;this.Fc=a.Ea.Fc;this.ea=this.Pi();a=-1*parseInt(_.Co(this.Pi().el(),"marginTop")||"0",10);var b=parseInt(_.Co(this.Pi().el(),"marginBottom")||"0",10);this.Ta={top:a,right:0,bottom:b,left:0};a=_.cf(this.getData("isMenuDynamic"),!1);b=_.cf(this.getData("isMenuHoisted"),!1);this.Ga=a?1:b?2:0;this.ka=!1;this.Ca=1;this.Ga!==1&&(this.aa=this.Sa("U0exHf").children().Wc(0),_.ku(this,.$5a(this,this.aa.el())));_.kF(this.oa())&&(a=this.oa().el(),b=this.we.bind(this),a.__soy_skip_handler=b)};_.J(_.uJ,_.X);_.uJ.Ba=function(){return{Ea:{ff:_.ZE,focus:_.KE,Fc:_.ru}}};_.uJ.prototype.xF=function(a){var b=a.source;this.Na=b;var c;((c=a.data)==null?0:c.fz)?(a=a.data.fz,this.Ca=a==="MOUS
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (570)
                                                        Category:downloaded
                                                        Size (bytes):3467
                                                        Entropy (8bit):5.514745431912774
                                                        Encrypted:false
                                                        SSDEEP:96:ozbld2fNUmeqJNizhNtt1W8t//loyIpXmdVE2w:onSKE8PWe/Cy4X3j
                                                        MD5:8DEF399E8355ABC23E64505281005099
                                                        SHA1:24FF74C3AEFD7696D84FF148465DF4B1B60B1696
                                                        SHA-256:F128D7218E1286B05DF11310AD3C8F4CF781402698E45448850D2A3A22F5F185
                                                        SHA-512:33721DD47658D8E12ADF6BD9E9316EB89F5B6297927F7FD60F954E04B829DCBF0E1AE6DDD9A3401F45E0011AE4B1397B960C218238A3D0F633A2173D8E604082
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,ZwDk9d,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,iAskyc,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,wg1P6b,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=Wt6vjf,hhhU8,FCpbqb,WhJNk"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("Wt6vjf");.var cya=function(){var a=_.He();return _.Lj(a,1)},Yt=function(a){this.Da=_.t(a,0,Yt.messageId)};_.J(Yt,_.w);Yt.prototype.Ha=function(){return _.Dj(this,1)};Yt.prototype.Va=function(a){return _.Vj(this,1,a)};Yt.messageId="f.bo";var Zt=function(){_.hm.call(this)};_.J(Zt,_.hm);Zt.prototype.xd=function(){this.CT=!1;dya(this);_.hm.prototype.xd.call(this)};Zt.prototype.aa=function(){eya(this);if(this.wC)return fya(this),!1;if(!this.KV)return $t(this),!0;this.dispatchEvent("p");if(!this.zP)return $t(this),!0;this.wM?(this.dispatchEvent("r"),$t(this)):fya(this);return!1};.var gya=function(a){var b=new _.ap(a.W4);a.qQ!=null&&_.Jn(b,"authuser",a.qQ);return b},fya=function(a){a.wC=!0;var b=gya(a),c="rt=r&f_uid="+_.pk(a.zP);_.cn(b,(0,_.bg)(a.ea,a),"POST",c)};.Zt.prototype.ea=function(a){a=a.target;eya(this);if(_.fn(a)){this.cK=0;if(this.wM)this.wC=!1,this.dispatchEvent("r"
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (1694)
                                                        Category:downloaded
                                                        Size (bytes):32500
                                                        Entropy (8bit):5.378903546681047
                                                        Encrypted:false
                                                        SSDEEP:768:zYlbuROstb0e39nKGrkysU0smpu4OLOdzIf1p/5GeSsngurz6aKEEEGo/:zYl61Cysbu4OLOdzIfrIen72ZFo/
                                                        MD5:BF4BF9728A7C302FBA5B14F3D0F1878B
                                                        SHA1:2607CA7A93710D629400077FF3602CB207E6F53D
                                                        SHA-256:8981E7B228DF7D6A8797C0CD1E9B0F1F88337D5F0E1C27A04E7A57D2C4309798
                                                        SHA-512:AC9E170FC3AFDC0CF6BB8E926B93EF129A5FAD1BBA51B60BABCF3555E9B652E98F86A00FB099879DED35DD3FFE72ECFA597E20E6CA8CF402BEDEC40F78412EDA
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en.RgRbaBHDctU.es5.O/ck=boq-identity.AccountsSignInUi.gAiX_O5afVA.L.B1.O/am=xIFgKBi2EQjEE54DekBRIOQAAAAAAAAAAKANAAB0DA/d=1/exm=_b,_tp/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlG_aYNE-Dz95N0OV63231Yfi4Jf5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=byfTOb,lsjVmc,LEikZe"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{.var Aua=function(a,b){this.da=a;this.ea=b;if(!c){var c=new _.ap("//www.google.com/images/cleardot.gif");_.op(c)}this.ka=c};_.h=Aua.prototype;_.h.Zc=null;_.h.lZ=1E4;_.h.bA=!1;_.h.nQ=0;_.h.zJ=null;_.h.bV=null;_.h.setTimeout=function(a){this.lZ=a};_.h.start=function(){if(this.bA)throw Error("dc");this.bA=!0;this.nQ=0;Bua(this)};_.h.stop=function(){Cua(this);this.bA=!1};.var Bua=function(a){a.nQ++;navigator!==null&&"onLine"in navigator&&!navigator.onLine?_.km((0,_.bg)(a.aH,a,!1),0):(a.aa=new Image,a.aa.onload=(0,_.bg)(a.Fja,a),a.aa.onerror=(0,_.bg)(a.Eja,a),a.aa.onabort=(0,_.bg)(a.Dja,a),a.zJ=_.km(a.Gja,a.lZ,a),a.aa.src=String(a.ka))};_.h=Aua.prototype;_.h.Fja=function(){this.aH(!0)};_.h.Eja=function(){this.aH(!1)};_.h.Dja=function(){this.aH(!1)};_.h.Gja=function(){this.aH(!1)};._.h.aH=function(a){Cua(this);a?(this.bA=!1,this.da.call(this.ea,!0)):this.nQ<=0?Bua(this):(this.bA=!1,
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):6.582478564789801
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:file.exe
                                                        File size:918'528 bytes
                                                        MD5:1cc0eec2a3105dbf316fdc0fbaac2bc9
                                                        SHA1:5edd2ae6665330de970ac886d99242da9afdc2cd
                                                        SHA256:4e0d0b1dfb20de40249c8015e0b85ae809cdea9fe4191101eccf19448511b115
                                                        SHA512:fa5aea0be6f2a6b6eebc28c51fb8e6d5798df79a7b27df7e208a0e4984292242255dd54c94a1bee338034151f9817eaa36103cb537d61a9d35a11ef33cd1d39d
                                                        SSDEEP:12288:DqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgaBTG:DqDEvCTbMWu7rQYlBQcBiT6rprG8aVG
                                                        TLSH:DB159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                                                        File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                        Icon Hash:aaf3e3e3938382a0
                                                        Entrypoint:0x420577
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x66FD8129 [Wed Oct 2 17:21:45 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:1
                                                        File Version Major:5
                                                        File Version Minor:1
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:1
                                                        Import Hash:948cc502fe9226992dce9417f952fce3
                                                        Instruction
                                                        call 00007FA1D08BFFD3h
                                                        jmp 00007FA1D08BF8DFh
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        push dword ptr [ebp+08h]
                                                        mov esi, ecx
                                                        call 00007FA1D08BFABDh
                                                        mov dword ptr [esi], 0049FDF0h
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        and dword ptr [ecx+04h], 00000000h
                                                        mov eax, ecx
                                                        and dword ptr [ecx+08h], 00000000h
                                                        mov dword ptr [ecx+04h], 0049FDF8h
                                                        mov dword ptr [ecx], 0049FDF0h
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        push dword ptr [ebp+08h]
                                                        mov esi, ecx
                                                        call 00007FA1D08BFA8Ah
                                                        mov dword ptr [esi], 0049FE0Ch
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        and dword ptr [ecx+04h], 00000000h
                                                        mov eax, ecx
                                                        and dword ptr [ecx+08h], 00000000h
                                                        mov dword ptr [ecx+04h], 0049FE14h
                                                        mov dword ptr [ecx], 0049FE0Ch
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        mov esi, ecx
                                                        lea eax, dword ptr [esi+04h]
                                                        mov dword ptr [esi], 0049FDD0h
                                                        and dword ptr [eax], 00000000h
                                                        and dword ptr [eax+04h], 00000000h
                                                        push eax
                                                        mov eax, dword ptr [ebp+08h]
                                                        add eax, 04h
                                                        push eax
                                                        call 00007FA1D08C267Dh
                                                        pop ecx
                                                        pop ecx
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        lea eax, dword ptr [ecx+04h]
                                                        mov dword ptr [ecx], 0049FDD0h
                                                        push eax
                                                        call 00007FA1D08C26C8h
                                                        pop ecx
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        mov esi, ecx
                                                        lea eax, dword ptr [esi+04h]
                                                        mov dword ptr [esi], 0049FDD0h
                                                        push eax
                                                        call 00007FA1D08C26B1h
                                                        test byte ptr [ebp+08h], 00000001h
                                                        pop ecx
                                                        Programming Language:
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x9944.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0xd40000x99440x9a000d02492706b10f5353a260827c305701False0.3037997159090909data5.281111615804736IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                        RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                        RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                        RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                        RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                        RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                        RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                        RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                        RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                        RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                        RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                        RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                        RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                        RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                        RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                        RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                        RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                        RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                        RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                        RT_RCDATA0xdc7b80xc0cdata1.0035667963683528
                                                        RT_GROUP_ICON0xdd3c40x76dataEnglishGreat Britain0.6610169491525424
                                                        RT_GROUP_ICON0xdd43c0x14dataEnglishGreat Britain1.25
                                                        RT_GROUP_ICON0xdd4500x14dataEnglishGreat Britain1.15
                                                        RT_GROUP_ICON0xdd4640x14dataEnglishGreat Britain1.25
                                                        RT_VERSION0xdd4780xdcdataEnglishGreat Britain0.6181818181818182
                                                        RT_MANIFEST0xdd5540x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                        DLLImport
                                                        WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                        VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                        MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                        WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                        PSAPI.DLLGetProcessMemoryInfo
                                                        IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                        USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                        UxTheme.dllIsThemeActive
                                                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                        USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                        GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                        COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                        SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                        OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishGreat Britain
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Oct 2, 2024 19:24:03.353795052 CEST49732443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:03.353832960 CEST44349732142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:03.353880882 CEST49732443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:03.355113029 CEST49732443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:03.355149031 CEST44349732142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:03.990503073 CEST44349732142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:03.992302895 CEST49732443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:03.992316008 CEST44349732142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:03.992679119 CEST44349732142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:03.992733002 CEST49732443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:03.993516922 CEST44349732142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:03.993556023 CEST49732443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:03.995837927 CEST49732443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:03.995898008 CEST44349732142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:03.997369051 CEST49732443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:03.997379065 CEST44349732142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:04.038039923 CEST49732443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:04.285315990 CEST44349732142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:04.285516024 CEST44349732142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:04.285573959 CEST49732443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:04.286350965 CEST49732443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:04.286364079 CEST44349732142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:04.298224926 CEST49736443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:24:04.298249960 CEST44349736142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:24:04.298306942 CEST49736443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:24:04.298671961 CEST49736443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:24:04.298686981 CEST44349736142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:24:04.350543976 CEST49675443192.168.2.4173.222.162.32
                                                        Oct 2, 2024 19:24:05.019434929 CEST44349736142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:24:05.043402910 CEST49736443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:24:05.043435097 CEST44349736142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:24:05.044826031 CEST44349736142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:24:05.045908928 CEST49736443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:24:05.047302961 CEST44349736142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:24:05.047406912 CEST49736443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:24:05.049241066 CEST49736443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:24:05.049241066 CEST49736443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:24:05.049264908 CEST44349736142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:24:05.049433947 CEST44349736142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:24:05.101558924 CEST49736443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:24:05.101581097 CEST44349736142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:24:05.147429943 CEST49736443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:24:05.322061062 CEST44349736142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:24:05.322118998 CEST44349736142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:24:05.322210073 CEST49736443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:24:05.322222948 CEST44349736142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:24:05.322288990 CEST44349736142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:24:05.322817087 CEST49736443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:24:05.324707031 CEST49736443192.168.2.4142.250.185.142
                                                        Oct 2, 2024 19:24:05.324722052 CEST44349736142.250.185.142192.168.2.4
                                                        Oct 2, 2024 19:24:07.236485958 CEST49741443192.168.2.4142.250.186.132
                                                        Oct 2, 2024 19:24:07.236504078 CEST44349741142.250.186.132192.168.2.4
                                                        Oct 2, 2024 19:24:07.236557961 CEST49741443192.168.2.4142.250.186.132
                                                        Oct 2, 2024 19:24:07.236767054 CEST49741443192.168.2.4142.250.186.132
                                                        Oct 2, 2024 19:24:07.236778021 CEST44349741142.250.186.132192.168.2.4
                                                        Oct 2, 2024 19:24:07.821887016 CEST49742443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:24:07.821928978 CEST44349742184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:24:07.821991920 CEST49742443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:24:07.823550940 CEST49742443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:24:07.823574066 CEST44349742184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:24:07.890825987 CEST44349741142.250.186.132192.168.2.4
                                                        Oct 2, 2024 19:24:07.891314983 CEST49741443192.168.2.4142.250.186.132
                                                        Oct 2, 2024 19:24:07.891382933 CEST44349741142.250.186.132192.168.2.4
                                                        Oct 2, 2024 19:24:07.892271996 CEST44349741142.250.186.132192.168.2.4
                                                        Oct 2, 2024 19:24:07.892337084 CEST49741443192.168.2.4142.250.186.132
                                                        Oct 2, 2024 19:24:07.893369913 CEST49741443192.168.2.4142.250.186.132
                                                        Oct 2, 2024 19:24:07.893431902 CEST44349741142.250.186.132192.168.2.4
                                                        Oct 2, 2024 19:24:07.946033001 CEST49741443192.168.2.4142.250.186.132
                                                        Oct 2, 2024 19:24:07.946052074 CEST44349741142.250.186.132192.168.2.4
                                                        Oct 2, 2024 19:24:07.992917061 CEST49741443192.168.2.4142.250.186.132
                                                        Oct 2, 2024 19:24:08.484481096 CEST44349742184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:24:08.484553099 CEST49742443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:24:08.488857985 CEST49742443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:24:08.488874912 CEST44349742184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:24:08.489306927 CEST44349742184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:24:08.539752960 CEST49742443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:24:08.560575962 CEST49742443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:24:08.607429028 CEST44349742184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:24:08.749891996 CEST44349742184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:24:08.750063896 CEST44349742184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:24:08.750140905 CEST49742443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:24:08.750236034 CEST49742443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:24:08.750236988 CEST49742443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:24:08.750287056 CEST44349742184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:24:08.750315905 CEST44349742184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:24:08.795494080 CEST49745443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:24:08.795598984 CEST44349745184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:24:08.795819044 CEST49745443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:24:08.796053886 CEST49745443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:24:08.796094894 CEST44349745184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:24:09.462654114 CEST44349745184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:24:09.462802887 CEST49745443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:24:09.465389013 CEST49745443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:24:09.465437889 CEST44349745184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:24:09.465956926 CEST44349745184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:24:09.467271090 CEST49745443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:24:09.511396885 CEST44349745184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:24:09.743221045 CEST44349745184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:24:09.743319035 CEST44349745184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:24:09.746588945 CEST49745443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:24:09.996844053 CEST49745443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:24:09.996874094 CEST44349745184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:24:09.996891975 CEST49745443192.168.2.4184.28.90.27
                                                        Oct 2, 2024 19:24:09.996900082 CEST44349745184.28.90.27192.168.2.4
                                                        Oct 2, 2024 19:24:12.492230892 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:12.492275953 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:12.492341995 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:12.493601084 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:12.493616104 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.214219093 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.214557886 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.214586020 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.215151072 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.215219021 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.216218948 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.216281891 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.217449903 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.217544079 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.217645884 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.217660904 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.273056030 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.537508965 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.537606001 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.537620068 CEST49761443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:13.537653923 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.537657976 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.537681103 CEST44349761142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:13.537689924 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.537719965 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.537754059 CEST49761443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:13.541980028 CEST49761443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:13.542021036 CEST44349761142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:13.543201923 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.543258905 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.543287992 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.549487114 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.549527884 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.549552917 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.549577951 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.549618959 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.555835009 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.555887938 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.562164068 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.562207937 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.562247992 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.562271118 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.562311888 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.612762928 CEST49763443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:13.612807035 CEST44349763142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:13.613032103 CEST49763443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:13.613225937 CEST49763443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:13.613240004 CEST44349763142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:13.633083105 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.633152008 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.633202076 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.633244991 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.633284092 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.633302927 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.633304119 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.633304119 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.633337021 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.633378029 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.638808966 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.638922930 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.645514965 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.645567894 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.645586967 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.668560982 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.668608904 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.668637991 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.668643951 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.668672085 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.668689966 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.673973083 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:13.674037933 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.674123049 CEST49759443192.168.2.4142.250.184.238
                                                        Oct 2, 2024 19:24:13.674144030 CEST44349759142.250.184.238192.168.2.4
                                                        Oct 2, 2024 19:24:14.172396898 CEST44349761142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.172746897 CEST49761443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.172785044 CEST44349761142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.173299074 CEST44349761142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.173367977 CEST49761443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.174297094 CEST44349761142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.174350977 CEST49761443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.175263882 CEST49761443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.175364017 CEST44349761142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.175576925 CEST49761443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.175590038 CEST44349761142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.227869987 CEST49761443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.456201077 CEST44349763142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.456423998 CEST49763443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.456434965 CEST44349763142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.456950903 CEST44349763142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.457020998 CEST49763443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.457971096 CEST44349763142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.458031893 CEST49763443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.458138943 CEST49763443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.458214998 CEST44349763142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.458442926 CEST49763443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.458450079 CEST44349763142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.491576910 CEST44349761142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.491904020 CEST44349761142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.491991043 CEST49761443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.493132114 CEST49761443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.493160963 CEST44349761142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.493176937 CEST49761443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.493236065 CEST49761443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.495085001 CEST49765443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.495127916 CEST44349765142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.495193958 CEST49765443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.495949030 CEST49765443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.495965004 CEST44349765142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.501379013 CEST49763443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.760138035 CEST44349763142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.760236979 CEST44349763142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.760310888 CEST49763443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.794105053 CEST49763443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.794131994 CEST44349763142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.795237064 CEST49766443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.795346975 CEST44349766142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:14.795437098 CEST49766443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.795768023 CEST49766443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:14.795779943 CEST44349766142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:15.134372950 CEST44349765142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:15.134694099 CEST49765443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:15.134721994 CEST44349765142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:15.135077953 CEST44349765142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:15.135152102 CEST49765443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:15.135813951 CEST44349765142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:15.135869026 CEST49765443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:15.136004925 CEST49765443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:15.136055946 CEST44349765142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:15.136168003 CEST49765443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:15.136174917 CEST44349765142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:15.136187077 CEST49765443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:15.179140091 CEST49765443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:15.179184914 CEST44349765142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:15.352976084 CEST44349765142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:15.354636908 CEST44349765142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:15.354706049 CEST49765443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:15.355221033 CEST49765443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:15.355233908 CEST44349765142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:15.422213078 CEST44349766142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:15.422580957 CEST49766443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:15.422620058 CEST44349766142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:15.422976017 CEST44349766142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:15.423041105 CEST49766443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:15.423674107 CEST44349766142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:15.423732996 CEST49766443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:15.423882961 CEST49766443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:15.424047947 CEST49766443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:15.424057007 CEST44349766142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:15.424068928 CEST49766443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:15.424088001 CEST44349766142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:15.467672110 CEST49766443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:15.467715025 CEST44349766142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:15.510337114 CEST49766443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:15.641486883 CEST44349766142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:15.642920971 CEST44349766142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:15.642996073 CEST49766443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:15.643966913 CEST49766443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:15.643996000 CEST44349766142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:16.248440981 CEST49741443192.168.2.4142.250.186.132
                                                        Oct 2, 2024 19:24:16.295413971 CEST44349741142.250.186.132192.168.2.4
                                                        Oct 2, 2024 19:24:16.521365881 CEST44349741142.250.186.132192.168.2.4
                                                        Oct 2, 2024 19:24:16.521420002 CEST44349741142.250.186.132192.168.2.4
                                                        Oct 2, 2024 19:24:16.521450043 CEST44349741142.250.186.132192.168.2.4
                                                        Oct 2, 2024 19:24:16.521475077 CEST49741443192.168.2.4142.250.186.132
                                                        Oct 2, 2024 19:24:16.521488905 CEST44349741142.250.186.132192.168.2.4
                                                        Oct 2, 2024 19:24:16.521500111 CEST44349741142.250.186.132192.168.2.4
                                                        Oct 2, 2024 19:24:16.521537066 CEST49741443192.168.2.4142.250.186.132
                                                        Oct 2, 2024 19:24:16.521553993 CEST44349741142.250.186.132192.168.2.4
                                                        Oct 2, 2024 19:24:16.521673918 CEST49741443192.168.2.4142.250.186.132
                                                        Oct 2, 2024 19:24:16.521790981 CEST44349741142.250.186.132192.168.2.4
                                                        Oct 2, 2024 19:24:16.521846056 CEST44349741142.250.186.132192.168.2.4
                                                        Oct 2, 2024 19:24:16.521892071 CEST49741443192.168.2.4142.250.186.132
                                                        Oct 2, 2024 19:24:16.526580095 CEST49741443192.168.2.4142.250.186.132
                                                        Oct 2, 2024 19:24:16.526597023 CEST44349741142.250.186.132192.168.2.4
                                                        Oct 2, 2024 19:24:16.526612043 CEST49741443192.168.2.4142.250.186.132
                                                        Oct 2, 2024 19:24:16.526647091 CEST49741443192.168.2.4142.250.186.132
                                                        Oct 2, 2024 19:24:18.790286064 CEST49774443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:18.790335894 CEST4434977420.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:18.790456057 CEST49774443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:18.791614056 CEST49774443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:18.791630030 CEST4434977420.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:19.389389992 CEST4434977420.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:19.389468908 CEST49774443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:19.392939091 CEST49774443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:19.392956972 CEST4434977420.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:19.393301964 CEST4434977420.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:19.446898937 CEST49774443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:20.142170906 CEST49774443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:20.187392950 CEST4434977420.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:20.337682009 CEST4434977420.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:20.337704897 CEST4434977420.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:20.337712049 CEST4434977420.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:20.337740898 CEST4434977420.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:20.337753057 CEST4434977420.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:20.337764978 CEST4434977420.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:20.337781906 CEST49774443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:20.337781906 CEST49774443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:20.337806940 CEST4434977420.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:20.337821007 CEST49774443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:20.337856054 CEST49774443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:20.338603973 CEST4434977420.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:20.338663101 CEST49774443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:20.338670969 CEST4434977420.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:20.338758945 CEST4434977420.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:20.339807987 CEST49774443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:21.050494909 CEST49774443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:21.050520897 CEST4434977420.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:21.050533056 CEST49774443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:21.050538063 CEST4434977420.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:21.309814930 CEST49779443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:21.309868097 CEST44349779142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:21.310204983 CEST49779443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:21.310506105 CEST49779443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:21.310518980 CEST44349779142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:21.589925051 CEST8049723178.79.208.1192.168.2.4
                                                        Oct 2, 2024 19:24:21.590068102 CEST4972380192.168.2.4178.79.208.1
                                                        Oct 2, 2024 19:24:21.590241909 CEST4972380192.168.2.4178.79.208.1
                                                        Oct 2, 2024 19:24:21.595091105 CEST8049723178.79.208.1192.168.2.4
                                                        Oct 2, 2024 19:24:21.942147017 CEST44349779142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:21.942464113 CEST49779443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:21.942487955 CEST44349779142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:21.942810059 CEST44349779142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:21.943202972 CEST49779443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:21.943267107 CEST44349779142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:21.943423986 CEST49779443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:21.943423986 CEST49779443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:21.943453074 CEST44349779142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:22.265971899 CEST44349779142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:22.266927958 CEST44349779142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:22.267009974 CEST49779443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:22.328310966 CEST49779443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:22.328335047 CEST44349779142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:33.581281900 CEST6274653192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:24:33.586412907 CEST53627461.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:24:33.586532116 CEST6274653192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:24:33.591481924 CEST53627461.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:24:34.042057037 CEST6274653192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:24:34.048090935 CEST53627461.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:24:34.048199892 CEST6274653192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:24:43.902271986 CEST62747443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:43.902313948 CEST44362747142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:43.902445078 CEST62747443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:43.902990103 CEST62747443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:43.903008938 CEST44362747142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:43.964338064 CEST62748443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:43.964378119 CEST44362748142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:43.964468956 CEST62748443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:43.965146065 CEST62748443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:43.965162992 CEST44362748142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:44.607639074 CEST44362748142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:44.608019114 CEST62748443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:44.608059883 CEST44362748142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:44.608669996 CEST44362748142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:44.609117985 CEST62748443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:44.609205008 CEST44362748142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:44.609358072 CEST62748443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:44.609388113 CEST62748443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:44.609395981 CEST44362748142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:44.635656118 CEST44362747142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:44.636007071 CEST62747443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:44.636030912 CEST44362747142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:44.636698961 CEST44362747142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:44.637152910 CEST62747443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:44.637238026 CEST44362747142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:44.637372971 CEST62747443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:44.637387991 CEST62747443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:44.637403965 CEST44362747142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:44.821669102 CEST44362748142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:44.821970940 CEST44362748142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:44.822053909 CEST62748443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:44.822277069 CEST62748443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:44.822302103 CEST44362748142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:44.945589066 CEST44362747142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:44.946620941 CEST44362747142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:44.946707010 CEST62747443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:44.947263002 CEST62747443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:44.947284937 CEST44362747142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:45.355446100 CEST62749443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:45.355561972 CEST44362749142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:45.355817080 CEST62749443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:45.356136084 CEST62749443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:45.356165886 CEST44362749142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:46.027157068 CEST44362749142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:46.027676105 CEST62749443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:46.027746916 CEST44362749142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:46.028275967 CEST44362749142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:46.028886080 CEST62749443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:46.028975964 CEST44362749142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:46.029231071 CEST62749443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:46.029264927 CEST62749443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:46.029277086 CEST44362749142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:46.255243063 CEST44362749142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:46.255848885 CEST44362749142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:46.256042957 CEST62749443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:46.256424904 CEST62749443192.168.2.4142.250.184.206
                                                        Oct 2, 2024 19:24:46.256491899 CEST44362749142.250.184.206192.168.2.4
                                                        Oct 2, 2024 19:24:57.800357103 CEST62750443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:57.800404072 CEST4436275020.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:57.800483942 CEST62750443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:57.800839901 CEST62750443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:57.800851107 CEST4436275020.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:58.408963919 CEST4436275020.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:58.409116983 CEST62750443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:58.419159889 CEST62750443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:58.419179916 CEST4436275020.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:58.420084000 CEST4436275020.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:58.427894115 CEST62750443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:58.475394011 CEST4436275020.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:58.664398909 CEST4436275020.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:58.664453983 CEST4436275020.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:58.664494991 CEST4436275020.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:58.664602995 CEST62750443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:58.664618015 CEST4436275020.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:58.664635897 CEST4436275020.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:58.664671898 CEST62750443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:58.664676905 CEST4436275020.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:58.664702892 CEST62750443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:58.664737940 CEST62750443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:58.665330887 CEST4436275020.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:58.665433884 CEST4436275020.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:58.665478945 CEST62750443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:58.672246933 CEST62750443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:58.672270060 CEST4436275020.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:24:58.672285080 CEST62750443192.168.2.420.12.23.50
                                                        Oct 2, 2024 19:24:58.672290087 CEST4436275020.12.23.50192.168.2.4
                                                        Oct 2, 2024 19:25:07.299072027 CEST62752443192.168.2.4172.217.18.4
                                                        Oct 2, 2024 19:25:07.299139977 CEST44362752172.217.18.4192.168.2.4
                                                        Oct 2, 2024 19:25:07.299253941 CEST62752443192.168.2.4172.217.18.4
                                                        Oct 2, 2024 19:25:07.299446106 CEST62752443192.168.2.4172.217.18.4
                                                        Oct 2, 2024 19:25:07.299468040 CEST44362752172.217.18.4192.168.2.4
                                                        Oct 2, 2024 19:25:07.959867001 CEST44362752172.217.18.4192.168.2.4
                                                        Oct 2, 2024 19:25:07.960350037 CEST62752443192.168.2.4172.217.18.4
                                                        Oct 2, 2024 19:25:07.960361004 CEST44362752172.217.18.4192.168.2.4
                                                        Oct 2, 2024 19:25:07.961472988 CEST44362752172.217.18.4192.168.2.4
                                                        Oct 2, 2024 19:25:07.961795092 CEST62752443192.168.2.4172.217.18.4
                                                        Oct 2, 2024 19:25:07.961962938 CEST44362752172.217.18.4192.168.2.4
                                                        Oct 2, 2024 19:25:08.008956909 CEST62752443192.168.2.4172.217.18.4
                                                        Oct 2, 2024 19:25:10.804727077 CEST4972480192.168.2.488.221.110.106
                                                        Oct 2, 2024 19:25:10.812949896 CEST804972488.221.110.106192.168.2.4
                                                        Oct 2, 2024 19:25:10.813102007 CEST4972480192.168.2.488.221.110.106
                                                        Oct 2, 2024 19:25:17.864425898 CEST44362752172.217.18.4192.168.2.4
                                                        Oct 2, 2024 19:25:17.864521027 CEST44362752172.217.18.4192.168.2.4
                                                        Oct 2, 2024 19:25:17.864562988 CEST62752443192.168.2.4172.217.18.4
                                                        Oct 2, 2024 19:25:30.601983070 CEST62752443192.168.2.4172.217.18.4
                                                        Oct 2, 2024 19:25:30.602055073 CEST44362752172.217.18.4192.168.2.4
                                                        Oct 2, 2024 19:26:07.352982044 CEST62759443192.168.2.4172.217.18.4
                                                        Oct 2, 2024 19:26:07.353037119 CEST44362759172.217.18.4192.168.2.4
                                                        Oct 2, 2024 19:26:07.353566885 CEST62759443192.168.2.4172.217.18.4
                                                        Oct 2, 2024 19:26:07.353566885 CEST62759443192.168.2.4172.217.18.4
                                                        Oct 2, 2024 19:26:07.353614092 CEST44362759172.217.18.4192.168.2.4
                                                        Oct 2, 2024 19:26:07.994535923 CEST44362759172.217.18.4192.168.2.4
                                                        Oct 2, 2024 19:26:08.038897991 CEST62759443192.168.2.4172.217.18.4
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Oct 2, 2024 19:24:03.334824085 CEST5050553192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:24:03.334956884 CEST6051553192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:24:03.343002081 CEST53615911.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:24:03.343460083 CEST53605151.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:24:03.343647003 CEST53505051.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:24:03.349344015 CEST53592541.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:24:04.290518045 CEST5350653192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:24:04.290630102 CEST5220253192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:24:04.297583103 CEST53535061.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:24:04.297815084 CEST53522021.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:24:04.321902990 CEST53552081.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:24:07.227897882 CEST5631553192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:24:07.228018045 CEST6503553192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:24:07.235044956 CEST53563151.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:24:07.235719919 CEST53650351.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:24:10.001609087 CEST53551641.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:24:12.484332085 CEST5033453192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:24:12.484464884 CEST5830953192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:24:12.491400003 CEST53503341.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:24:12.491420984 CEST53583091.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:24:13.517786980 CEST5853053192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:24:13.517947912 CEST6547653192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:24:13.524643898 CEST53654761.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:24:13.524878025 CEST53585301.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:24:15.283921957 CEST53604151.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:24:21.241682053 CEST53581081.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:24:22.533901930 CEST138138192.168.2.4192.168.2.255
                                                        Oct 2, 2024 19:24:33.580831051 CEST53650871.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:24:40.111283064 CEST53502281.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:25:02.596137047 CEST53491731.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:25:02.705770016 CEST53604181.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:25:07.290992975 CEST6008553192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:25:07.291117907 CEST5254453192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:25:07.297868013 CEST53600851.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:25:07.298258066 CEST53525441.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:25:14.333589077 CEST53597701.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:25:14.612617016 CEST4943053192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:25:14.612689018 CEST5874553192.168.2.41.1.1.1
                                                        Oct 2, 2024 19:25:14.619513035 CEST53587451.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:25:14.619868994 CEST53494301.1.1.1192.168.2.4
                                                        Oct 2, 2024 19:25:30.609286070 CEST53608591.1.1.1192.168.2.4
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Oct 2, 2024 19:24:03.334824085 CEST192.168.2.41.1.1.10xabb8Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:03.334956884 CEST192.168.2.41.1.1.10xbdd4Standard query (0)youtube.com65IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.290518045 CEST192.168.2.41.1.1.10x8dc8Standard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.290630102 CEST192.168.2.41.1.1.10xace2Standard query (0)www.youtube.com65IN (0x0001)false
                                                        Oct 2, 2024 19:24:07.227897882 CEST192.168.2.41.1.1.10xa6a6Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:07.228018045 CEST192.168.2.41.1.1.10x2147Standard query (0)www.google.com65IN (0x0001)false
                                                        Oct 2, 2024 19:24:12.484332085 CEST192.168.2.41.1.1.10x96ecStandard query (0)accounts.youtube.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:12.484464884 CEST192.168.2.41.1.1.10xf481Standard query (0)accounts.youtube.com65IN (0x0001)false
                                                        Oct 2, 2024 19:24:13.517786980 CEST192.168.2.41.1.1.10x4bccStandard query (0)play.google.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:13.517947912 CEST192.168.2.41.1.1.10x989fStandard query (0)play.google.com65IN (0x0001)false
                                                        Oct 2, 2024 19:25:07.290992975 CEST192.168.2.41.1.1.10xc5acStandard query (0)www.google.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:25:07.291117907 CEST192.168.2.41.1.1.10x9a9bStandard query (0)www.google.com65IN (0x0001)false
                                                        Oct 2, 2024 19:25:14.612617016 CEST192.168.2.41.1.1.10xbe95Standard query (0)play.google.comA (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:25:14.612689018 CEST192.168.2.41.1.1.10x16deStandard query (0)play.google.com65IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Oct 2, 2024 19:24:03.343460083 CEST1.1.1.1192.168.2.40xbdd4No error (0)youtube.com65IN (0x0001)false
                                                        Oct 2, 2024 19:24:03.343647003 CEST1.1.1.1192.168.2.40xabb8No error (0)youtube.com142.250.184.238A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.297583103 CEST1.1.1.1192.168.2.40x8dc8No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.297583103 CEST1.1.1.1192.168.2.40x8dc8No error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.297583103 CEST1.1.1.1192.168.2.40x8dc8No error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.297583103 CEST1.1.1.1192.168.2.40x8dc8No error (0)youtube-ui.l.google.com142.250.186.142A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.297583103 CEST1.1.1.1192.168.2.40x8dc8No error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.297583103 CEST1.1.1.1192.168.2.40x8dc8No error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.297583103 CEST1.1.1.1192.168.2.40x8dc8No error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.297583103 CEST1.1.1.1192.168.2.40x8dc8No error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.297583103 CEST1.1.1.1192.168.2.40x8dc8No error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.297583103 CEST1.1.1.1192.168.2.40x8dc8No error (0)youtube-ui.l.google.com172.217.23.110A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.297583103 CEST1.1.1.1192.168.2.40x8dc8No error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.297583103 CEST1.1.1.1192.168.2.40x8dc8No error (0)youtube-ui.l.google.com172.217.18.110A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.297583103 CEST1.1.1.1192.168.2.40x8dc8No error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.297583103 CEST1.1.1.1192.168.2.40x8dc8No error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.297583103 CEST1.1.1.1192.168.2.40x8dc8No error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.297583103 CEST1.1.1.1192.168.2.40x8dc8No error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.297583103 CEST1.1.1.1192.168.2.40x8dc8No error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.297815084 CEST1.1.1.1192.168.2.40xace2No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 2, 2024 19:24:04.297815084 CEST1.1.1.1192.168.2.40xace2No error (0)youtube-ui.l.google.com65IN (0x0001)false
                                                        Oct 2, 2024 19:24:07.235044956 CEST1.1.1.1192.168.2.40xa6a6No error (0)www.google.com142.250.186.132A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:07.235719919 CEST1.1.1.1192.168.2.40x2147No error (0)www.google.com65IN (0x0001)false
                                                        Oct 2, 2024 19:24:12.491400003 CEST1.1.1.1192.168.2.40x96ecNo error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 2, 2024 19:24:12.491400003 CEST1.1.1.1192.168.2.40x96ecNo error (0)www3.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:24:12.491420984 CEST1.1.1.1192.168.2.40xf481No error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 2, 2024 19:24:13.524878025 CEST1.1.1.1192.168.2.40x4bccNo error (0)play.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:25:07.297868013 CEST1.1.1.1192.168.2.40xc5acNo error (0)www.google.com172.217.18.4A (IP address)IN (0x0001)false
                                                        Oct 2, 2024 19:25:07.298258066 CEST1.1.1.1192.168.2.40x9a9bNo error (0)www.google.com65IN (0x0001)false
                                                        Oct 2, 2024 19:25:14.619868994 CEST1.1.1.1192.168.2.40xbe95No error (0)play.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                        • youtube.com
                                                        • www.youtube.com
                                                        • fs.microsoft.com
                                                        • https:
                                                          • accounts.youtube.com
                                                          • play.google.com
                                                          • www.google.com
                                                        • slscr.update.microsoft.com
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.449732142.250.184.2384437980C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:24:03 UTC851OUTGET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1
                                                        Host: youtube.com
                                                        Connection: keep-alive
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Upgrade-Insecure-Requests: 1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: none
                                                        Sec-Fetch-Mode: navigate
                                                        Sec-Fetch-User: ?1
                                                        Sec-Fetch-Dest: document
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 17:24:04 UTC1704INHTTP/1.1 301 Moved Permanently
                                                        Content-Type: application/binary
                                                        X-Content-Type-Options: nosniff
                                                        Expires: Wed, 02 Oct 2024 17:24:04 GMT
                                                        Date: Wed, 02 Oct 2024 17:24:04 GMT
                                                        Cache-Control: private, max-age=31536000
                                                        Location: https://www.youtube.com/account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd
                                                        X-Frame-Options: SAMEORIGIN
                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                        Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                                                        Content-Security-Policy: require-trusted-types-for 'script'
                                                        Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                                                        Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Server: ESF
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.449736142.250.185.1424437980C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:24:05 UTC869OUTGET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1
                                                        Host: www.youtube.com
                                                        Connection: keep-alive
                                                        Upgrade-Insecure-Requests: 1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: none
                                                        Sec-Fetch-Mode: navigate
                                                        Sec-Fetch-User: ?1
                                                        Sec-Fetch-Dest: document
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 17:24:05 UTC2634INHTTP/1.1 303 See Other
                                                        Content-Type: application/binary
                                                        X-Content-Type-Options: nosniff
                                                        Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                        Pragma: no-cache
                                                        Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                        Date: Wed, 02 Oct 2024 17:24:05 GMT
                                                        Location: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%253F%253Dhttps%25253A%25252F%25252Faccounts.google.com%25252Fv3%25252Fsignin%25252Fchallenge%25252Fpwd%26feature%3Dredirect_login&hl=en
                                                        X-Frame-Options: SAMEORIGIN
                                                        Strict-Transport-Security: max-age=31536000
                                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                        Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                                                        Content-Security-Policy: require-trusted-types-for 'script'
                                                        Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                                                        Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        P3P: CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657?hl=en for more info."
                                                        Server: ESF
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        Set-Cookie: GPS=1; Domain=.youtube.com; Expires=Wed, 02-Oct-2024 17:54:05 GMT; Path=/; Secure; HttpOnly
                                                        Set-Cookie: YSC=FRc52ABEn3g; Domain=.youtube.com; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                        Set-Cookie: VISITOR_INFO1_LIVE=gqSdc1YoFP8; Domain=.youtube.com; Expires=Mon, 31-Mar-2025 17:24:05 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                        Set-Cookie: VISITOR_PRIVACY_METADATA=CgJVUxIEGgAgUA%3D%3D; Domain=.youtube.com; Expires=Mon, 31-Mar-2025 17:24:05 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.449742184.28.90.27443
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:24:08 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        Accept-Encoding: identity
                                                        User-Agent: Microsoft BITS/7.8
                                                        Host: fs.microsoft.com
                                                        2024-10-02 17:24:08 UTC466INHTTP/1.1 200 OK
                                                        Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                        Content-Type: application/octet-stream
                                                        ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                        Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                        Server: ECAcc (lpl/EF06)
                                                        X-CID: 11
                                                        X-Ms-ApiVersion: Distribute 1.2
                                                        X-Ms-Region: prod-neu-z1
                                                        Cache-Control: public, max-age=84102
                                                        Date: Wed, 02 Oct 2024 17:24:08 GMT
                                                        Connection: close
                                                        X-CID: 2


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.449745184.28.90.27443
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:24:09 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        Accept-Encoding: identity
                                                        If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                                                        Range: bytes=0-2147483646
                                                        User-Agent: Microsoft BITS/7.8
                                                        Host: fs.microsoft.com
                                                        2024-10-02 17:24:09 UTC514INHTTP/1.1 200 OK
                                                        ApiVersion: Distribute 1.1
                                                        Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                        Content-Type: application/octet-stream
                                                        ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                        Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                        Server: ECAcc (lpl/EF06)
                                                        X-CID: 11
                                                        X-Ms-ApiVersion: Distribute 1.2
                                                        X-Ms-Region: prod-weu-z1
                                                        Cache-Control: public, max-age=84045
                                                        Date: Wed, 02 Oct 2024 17:24:09 GMT
                                                        Content-Length: 55
                                                        Connection: close
                                                        X-CID: 2
                                                        2024-10-02 17:24:09 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                                                        Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.449759142.250.184.2384437980C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:24:13 UTC1236OUTGET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=1552351272&timestamp=1727889851141 HTTP/1.1
                                                        Host: accounts.youtube.com
                                                        Connection: keep-alive
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-platform: "Windows"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        Upgrade-Insecure-Requests: 1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: cross-site
                                                        Sec-Fetch-Mode: navigate
                                                        Sec-Fetch-User: ?1
                                                        Sec-Fetch-Dest: iframe
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 17:24:13 UTC1969INHTTP/1.1 200 OK
                                                        Content-Type: text/html; charset=utf-8
                                                        X-Frame-Options: ALLOW-FROM https://accounts.google.com
                                                        Content-Security-Policy: frame-ancestors https://accounts.google.com
                                                        Content-Security-Policy: script-src 'report-sample' 'nonce-2EVwdHSaLSTlMaiHuye4OA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport;worker-src 'self'
                                                        Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport/allowlist
                                                        Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport
                                                        Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                        Pragma: no-cache
                                                        Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                        Date: Wed, 02 Oct 2024 17:24:13 GMT
                                                        Cross-Origin-Opener-Policy: same-origin
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                        reporting-endpoints: default="/_/AccountsDomainCookiesCheckConnectionHttp/web-reports?context=eJzjstDikmLw1pBikPj6kkkDiJ3SZ7AGAXHSv_OsRUB8ufsS63UgVu25xGoKxEUSV1ibgFiIh2Nv87ftbAIL7m45xqikl5RfGJ-ZkppXkllSmZKfm5iZl5yfn52ZWlycWlSWWhRvZGBkYmBpZKRnYBFfYAAA47Ytlw"
                                                        Server: ESF
                                                        X-XSS-Protection: 0
                                                        X-Content-Type-Options: nosniff
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 17:24:13 UTC1969INData Raw: 37 36 32 30 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 20 6e 6f 6e 63 65 3d 22 32 45 56 77 64 48 53 61 4c 53 54 6c 4d 61 69 48 75 79 65 34 4f 41 22 3e 22 75 73 65 20 73 74 72 69 63 74 22 3b 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 3d 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 7c 7c 7b 7d 3b 28 66 75 6e 63 74 69 6f 6e 28 5f 29 7b 76 61 72 20 77 69 6e 64 6f 77 3d 74 68 69 73 3b 0a 74 72 79 7b 0a 5f 2e 5f 46 5f 74 6f 67 67 6c 65 73 5f 69 6e 69 74 69 61 6c 69 7a 65 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 28 74 79 70 65 6f
                                                        Data Ascii: 7620<html><head><script nonce="2EVwdHSaLSTlMaiHuye4OA">"use strict";this.default_AccountsDomaincookiesCheckconnectionJs=this.default_AccountsDomaincookiesCheckconnectionJs||{};(function(_){var window=this;try{_._F_toggles_initialize=function(a){(typeo
                                                        2024-10-02 17:24:13 UTC1969INData Raw: 54 72 69 64 65 6e 74 5c 2f 28 5c 64 2e 5c 64 29 2f 2e 65 78 65 63 28 62 29 2c 0a 63 5b 31 5d 3d 3d 22 37 2e 30 22 29 69 66 28 62 26 26 62 5b 31 5d 29 73 77 69 74 63 68 28 62 5b 31 5d 29 7b 63 61 73 65 20 22 34 2e 30 22 3a 61 3d 22 38 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 35 2e 30 22 3a 61 3d 22 39 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 36 2e 30 22 3a 61 3d 22 31 30 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 37 2e 30 22 3a 61 3d 22 31 31 2e 30 22 7d 65 6c 73 65 20 61 3d 22 37 2e 30 22 3b 65 6c 73 65 20 61 3d 63 5b 31 5d 3b 62 3d 61 7d 65 6c 73 65 20 62 3d 22 22 3b 72 65 74 75 72 6e 20 62 7d 76 61 72 20 64 3d 52 65 67 45 78 70 28 22 28 5b 41 2d 5a 5d 5b 5c 5c 77 20 5d 2b 29 2f 28 5b 5e 5c 5c 73 5d 2b 29 5c 5c 73 2a 28 3f 3a 5c 5c 28
                                                        Data Ascii: Trident\/(\d.\d)/.exec(b),c[1]=="7.0")if(b&&b[1])switch(b[1]){case "4.0":a="8.0";break;case "5.0":a="9.0";break;case "6.0":a="10.0";break;case "7.0":a="11.0"}else a="7.0";else a=c[1];b=a}else b="";return b}var d=RegExp("([A-Z][\\w ]+)/([^\\s]+)\\s*(?:\\(
                                                        2024-10-02 17:24:13 UTC1969INData Raw: 74 63 68 28 74 79 70 65 6f 66 20 61 29 7b 63 61 73 65 20 22 6e 75 6d 62 65 72 22 3a 72 65 74 75 72 6e 20 69 73 46 69 6e 69 74 65 28 61 29 3f 61 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 69 67 69 6e 74 22 3a 72 65 74 75 72 6e 28 41 61 3f 0a 61 3e 3d 42 61 26 26 61 3c 3d 43 61 3a 61 5b 30 5d 3d 3d 3d 22 2d 22 3f 75 61 28 61 2c 44 61 29 3a 75 61 28 61 2c 45 61 29 29 3f 4e 75 6d 62 65 72 28 61 29 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 72 65 74 75 72 6e 20 61 3f 31 3a 30 3b 63 61 73 65 20 22 6f 62 6a 65 63 74 22 3a 69 66 28 61 29 69 66 28 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 61 29 29 7b 69 66 28 43 28 61 29 29 72 65 74 75 72 6e 7d 65 6c 73 65 20 69 66 28 46 61 26 26 61 21 3d 6e 75 6c 6c 26 26 61 20 69 6e
                                                        Data Ascii: tch(typeof a){case "number":return isFinite(a)?a:String(a);case "bigint":return(Aa?a>=Ba&&a<=Ca:a[0]==="-"?ua(a,Da):ua(a,Ea))?Number(a):String(a);case "boolean":return a?1:0;case "object":if(a)if(Array.isArray(a)){if(C(a))return}else if(Fa&&a!=null&&a in
                                                        2024-10-02 17:24:13 UTC1969INData Raw: 7b 76 61 72 20 62 3b 69 66 28 61 26 26 28 62 3d 51 61 29 21 3d 6e 75 6c 6c 26 26 62 2e 68 61 73 28 61 29 26 26 28 62 3d 61 2e 43 29 29 66 6f 72 28 76 61 72 20 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 62 5b 63 5d 3b 69 66 28 63 3d 3d 3d 62 2e 6c 65 6e 67 74 68 2d 31 26 26 41 28 64 29 29 66 6f 72 28 76 61 72 20 65 20 69 6e 20 64 29 7b 76 61 72 20 66 3d 64 5b 65 5d 3b 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 66 29 26 26 0a 52 61 28 66 2c 61 29 7d 65 6c 73 65 20 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 64 29 26 26 52 61 28 64 2c 61 29 7d 61 3d 45 3f 61 2e 43 3a 4d 61 28 61 2e 43 2c 50 61 2c 76 6f 69 64 20 30 2c 76 6f 69 64 20 30 2c 21 31 29 3b 65 3d 21 45 3b 69 66 28 62 3d 61 2e 6c 65 6e 67 74 68 29 7b 64 3d 61 5b 62 2d
                                                        Data Ascii: {var b;if(a&&(b=Qa)!=null&&b.has(a)&&(b=a.C))for(var c=0;c<b.length;c++){var d=b[c];if(c===b.length-1&&A(d))for(var e in d){var f=d[e];Array.isArray(f)&&Ra(f,a)}else Array.isArray(d)&&Ra(d,a)}a=E?a.C:Ma(a.C,Pa,void 0,void 0,!1);e=!E;if(b=a.length){d=a[b-
                                                        2024-10-02 17:24:13 UTC1969INData Raw: 6f 6c 2e 69 74 65 72 61 74 6f 72 22 2c 66 75 6e 63 74 69 6f 6e 28 61 29 7b 69 66 28 61 29 72 65 74 75 72 6e 20 61 3b 61 3d 53 79 6d 62 6f 6c 28 22 63 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 22 41 72 72 61 79 20 49 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 43 6c 61 6d 70 65 64 41 72 72 61 79 20 49 6e 74 31 36 41 72 72 61 79 20 55 69 6e 74 31 36 41 72 72 61 79 20 49 6e 74 33 32 41 72 72 61 79 20 55 69 6e 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 36 34 41 72 72 61 79 22 2e 73 70 6c 69 74 28 22 20 22 29 2c 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 57 61 5b 62 5b 63 5d 5d 3b 74 79 70 65 6f 66 20 64 3d 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 26 26 74 79 70 65
                                                        Data Ascii: ol.iterator",function(a){if(a)return a;a=Symbol("c");for(var b="Array Int8Array Uint8Array Uint8ClampedArray Int16Array Uint16Array Int32Array Uint32Array Float32Array Float64Array".split(" "),c=0;c<b.length;c++){var d=Wa[b[c]];typeof d==="function"&&type
                                                        2024-10-02 17:24:13 UTC1969INData Raw: 29 3b 65 28 22 66 72 65 65 7a 65 22 29 3b 65 28 22 70 72 65 76 65 6e 74 45 78 74 65 6e 73 69 6f 6e 73 22 29 3b 65 28 22 73 65 61 6c 22 29 3b 76 61 72 20 68 3d 30 2c 67 3d 66 75 6e 63 74 69 6f 6e 28 6b 29 7b 74 68 69 73 2e 67 3d 28 68 2b 3d 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2b 31 29 2e 74 6f 53 74 72 69 6e 67 28 29 3b 69 66 28 6b 29 7b 6b 3d 48 28 6b 29 3b 66 6f 72 28 76 61 72 20 6c 3b 21 28 6c 3d 6b 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6c 3d 6c 2e 76 61 6c 75 65 2c 74 68 69 73 2e 73 65 74 28 6c 5b 30 5d 2c 6c 5b 31 5d 29 7d 7d 3b 67 2e 70 72 6f 74 6f 74 79 70 65 2e 73 65 74 3d 66 75 6e 63 74 69 6f 6e 28 6b 2c 6c 29 7b 69 66 28 21 63 28 6b 29 29 74 68 72 6f 77 20 45 72 72 6f 72 28 22 69 22 29 3b 64 28 6b 29 3b 69 66 28 21 49 28 6b 2c 66 29 29
                                                        Data Ascii: );e("freeze");e("preventExtensions");e("seal");var h=0,g=function(k){this.g=(h+=Math.random()+1).toString();if(k){k=H(k);for(var l;!(l=k.next()).done;)l=l.value,this.set(l[0],l[1])}};g.prototype.set=function(k,l){if(!c(k))throw Error("i");d(k);if(!I(k,f))
                                                        2024-10-02 17:24:13 UTC1969INData Raw: 75 72 6e 20 67 2e 76 61 6c 75 65 7d 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 2e 66 6f 72 45 61 63 68 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 66 6f 72 28 76 61 72 20 6c 3d 74 68 69 73 2e 65 6e 74 72 69 65 73 28 29 2c 6d 3b 21 28 6d 3d 6c 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6d 3d 0a 6d 2e 76 61 6c 75 65 2c 67 2e 63 61 6c 6c 28 6b 2c 6d 5b 31 5d 2c 6d 5b 30 5d 2c 74 68 69 73 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 5b 53 79 6d 62 6f 6c 2e 69 74 65 72 61 74 6f 72 5d 3d 63 2e 70 72 6f 74 6f 74 79 70 65 2e 65 6e 74 72 69 65 73 3b 76 61 72 20 64 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 76 61 72 20 6c 3d 6b 26 26 74 79 70 65 6f 66 20 6b 3b 6c 3d 3d 22 6f 62 6a 65 63 74 22 7c 7c 6c 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 3f 62 2e 68 61 73 28 6b 29
                                                        Data Ascii: urn g.value})};c.prototype.forEach=function(g,k){for(var l=this.entries(),m;!(m=l.next()).done;)m=m.value,g.call(k,m[1],m[0],this)};c.prototype[Symbol.iterator]=c.prototype.entries;var d=function(g,k){var l=k&&typeof k;l=="object"||l=="function"?b.has(k)
                                                        2024-10-02 17:24:13 UTC1969INData Raw: 6f 6e 28 61 29 7b 72 65 74 75 72 6e 20 61 3f 61 3a 66 75 6e 63 74 69 6f 6e 28 62 29 7b 72 65 74 75 72 6e 20 74 79 70 65 6f 66 20 62 3d 3d 3d 22 6e 75 6d 62 65 72 22 26 26 69 73 4e 61 4e 28 62 29 7d 7d 29 3b 76 61 72 20 66 62 3d 66 62 7c 7c 7b 7d 2c 71 3d 74 68 69 73 7c 7c 73 65 6c 66 2c 67 62 3d 71 2e 5f 46 5f 74 6f 67 67 6c 65 73 7c 7c 5b 5d 2c 68 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 61 3d 61 2e 73 70 6c 69 74 28 22 2e 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 71 2c 63 3d 30 3b 63 3c 61 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 69 66 28 62 3d 62 5b 61 5b 63 5d 5d 2c 62 3d 3d 6e 75 6c 6c 29 72 65 74 75 72 6e 20 6e 75 6c 6c 3b 72 65 74 75 72 6e 20 62 7d 2c 69 62 3d 22 63 6c 6f 73 75 72 65 5f 75 69 64 5f 22 2b 28 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2a 31 45
                                                        Data Ascii: on(a){return a?a:function(b){return typeof b==="number"&&isNaN(b)}});var fb=fb||{},q=this||self,gb=q._F_toggles||[],hb=function(a){a=a.split(".");for(var b=q,c=0;c<a.length;c++)if(b=b[a[c]],b==null)return null;return b},ib="closure_uid_"+(Math.random()*1E
                                                        2024-10-02 17:24:13 UTC1969INData Raw: 74 65 78 74 5f 5f 39 38 34 33 38 32 3d 7b 7d 29 3b 61 2e 5f 5f 63 6c 6f 73 75 72 65 5f 5f 65 72 72 6f 72 5f 5f 63 6f 6e 74 65 78 74 5f 5f 39 38 34 33 38 32 2e 73 65 76 65 72 69 74 79 3d 62 7d 3b 76 61 72 20 71 62 3d 66 75 6e 63 74 69 6f 6e 28 61 2c 62 2c 63 29 7b 63 3d 63 7c 7c 71 3b 76 61 72 20 64 3d 63 2e 6f 6e 65 72 72 6f 72 2c 65 3d 21 21 62 3b 63 2e 6f 6e 65 72 72 6f 72 3d 66 75 6e 63 74 69 6f 6e 28 66 2c 68 2c 67 2c 6b 2c 6c 29 7b 64 26 26 64 28 66 2c 68 2c 67 2c 6b 2c 6c 29 3b 61 28 7b 6d 65 73 73 61 67 65 3a 66 2c 66 69 6c 65 4e 61 6d 65 3a 68 2c 6c 69 6e 65 3a 67 2c 6c 69 6e 65 4e 75 6d 62 65 72 3a 67 2c 63 61 3a 6b 2c 65 72 72 6f 72 3a 6c 7d 29 3b 72 65 74 75 72 6e 20 65 7d 7d 2c 74 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 76 61 72 20 62 3d 68
                                                        Data Ascii: text__984382={});a.__closure__error__context__984382.severity=b};var qb=function(a,b,c){c=c||q;var d=c.onerror,e=!!b;c.onerror=function(f,h,g,k,l){d&&d(f,h,g,k,l);a({message:f,fileName:h,line:g,lineNumber:g,ca:k,error:l});return e}},tb=function(a){var b=h
                                                        2024-10-02 17:24:13 UTC1969INData Raw: 22 6e 75 6d 62 65 72 22 3a 66 3d 53 74 72 69 6e 67 28 66 29 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 66 3d 66 3f 22 74 72 75 65 22 3a 22 66 61 6c 73 65 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 66 75 6e 63 74 69 6f 6e 22 3a 66 3d 28 66 3d 73 62 28 66 29 29 3f 66 3a 22 5b 66 6e 5d 22 3b 62 72 65 61 6b 3b 64 65 66 61 75 6c 74 3a 66 3d 0a 74 79 70 65 6f 66 20 66 7d 66 2e 6c 65 6e 67 74 68 3e 34 30 26 26 28 66 3d 66 2e 73 6c 69 63 65 28 30 2c 34 30 29 2b 22 2e 2e 2e 22 29 3b 63 2e 70 75 73 68 28 66 29 7d 62 2e 70 75 73 68 28 61 29 3b 63 2e 70 75 73 68 28 22 29 5c 6e 22 29 3b 74 72 79 7b 63 2e 70 75 73 68 28 77 62 28 61 2e 63 61 6c 6c 65 72 2c 62 29 29 7d 63 61 74 63 68 28 68 29 7b 63 2e 70 75 73 68 28 22 5b 65 78 63 65 70 74 69 6f 6e
                                                        Data Ascii: "number":f=String(f);break;case "boolean":f=f?"true":"false";break;case "function":f=(f=sb(f))?f:"[fn]";break;default:f=typeof f}f.length>40&&(f=f.slice(0,40)+"...");c.push(f)}b.push(a);c.push(")\n");try{c.push(wb(a.caller,b))}catch(h){c.push("[exception


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.449761142.250.184.2064437980C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:24:14 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Accept: */*
                                                        Access-Control-Request-Method: POST
                                                        Access-Control-Request-Headers: x-goog-authuser
                                                        Origin: https://accounts.google.com
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 17:24:14 UTC520INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                        Access-Control-Max-Age: 86400
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 17:24:14 GMT
                                                        Server: Playlog
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.449763142.250.184.2064437980C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:24:14 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Accept: */*
                                                        Access-Control-Request-Method: POST
                                                        Access-Control-Request-Headers: x-goog-authuser
                                                        Origin: https://accounts.google.com
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 17:24:14 UTC520INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                        Access-Control-Max-Age: 86400
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 17:24:14 GMT
                                                        Server: Playlog
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.449765142.250.184.2064437980C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:24:15 UTC1124OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 519
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 17:24:15 UTC519OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 39 38 35 32 32 31 35 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727889852215",null,null,null
                                                        2024-10-02 17:24:15 UTC933INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=iZs9D5xBIOhEdcFRH3Ne5lBU6ENZTwxQzSQUn_F6GXA_R6JG_4SGfzCJtY61sfzqdZ2vTtv4ddYRsm73nYbLXXGXGHYSF2a-OMP_00IHg3gsVAJcT1Z3270SWjqEchylZ3hIXbUffW4CCFhPb4XLc1CEnH7j7fD-ZNS4GQ4e2ttfBTq_R5Y; expires=Thu, 03-Apr-2025 17:24:15 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 17:24:15 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Wed, 02 Oct 2024 17:24:15 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 17:24:15 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 17:24:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        8192.168.2.449766142.250.184.2064437980C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:24:15 UTC1124OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 507
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-10-02 17:24:15 UTC507OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 39 38 35 32 33 31 32 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727889852312",null,null,null
                                                        2024-10-02 17:24:15 UTC933INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=vqgYLiANKHTkc6WX5XgaDxk4LZpfrK-Sm0UZ5ic_OYQbh3PBc31yZv-MEP4nCOcieycRFHyL-mYtD73GJ5Ej9mGwXeVfAcaPfhiBbrvOBq1gY15oTr9fTaqYH2-GIMUBGpBbuAwSTJiJ-s1UNAdPvIhPBM9dDiRFzeeYK7dX-pYHMfBF19A; expires=Thu, 03-Apr-2025 17:24:15 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 17:24:15 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Wed, 02 Oct 2024 17:24:15 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 17:24:15 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 17:24:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        9192.168.2.449741142.250.186.1324437980C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:24:16 UTC1214OUTGET /favicon.ico HTTP/1.1
                                                        Host: www.google.com
                                                        Connection: keep-alive
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: no-cors
                                                        Sec-Fetch-Dest: image
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=vqgYLiANKHTkc6WX5XgaDxk4LZpfrK-Sm0UZ5ic_OYQbh3PBc31yZv-MEP4nCOcieycRFHyL-mYtD73GJ5Ej9mGwXeVfAcaPfhiBbrvOBq1gY15oTr9fTaqYH2-GIMUBGpBbuAwSTJiJ-s1UNAdPvIhPBM9dDiRFzeeYK7dX-pYHMfBF19A
                                                        2024-10-02 17:24:16 UTC705INHTTP/1.1 200 OK
                                                        Accept-Ranges: bytes
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to="static-on-bigtable"
                                                        Report-To: {"group":"static-on-bigtable","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/static-on-bigtable"}]}
                                                        Content-Length: 5430
                                                        X-Content-Type-Options: nosniff
                                                        Server: sffe
                                                        X-XSS-Protection: 0
                                                        Date: Wed, 02 Oct 2024 15:37:10 GMT
                                                        Expires: Thu, 10 Oct 2024 15:37:10 GMT
                                                        Cache-Control: public, max-age=691200
                                                        Last-Modified: Tue, 22 Oct 2019 18:30:00 GMT
                                                        Content-Type: image/x-icon
                                                        Vary: Accept-Encoding
                                                        Age: 6426
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close
                                                        2024-10-02 17:24:16 UTC685INData Raw: 00 00 01 00 02 00 10 10 00 00 01 00 20 00 68 04 00 00 26 00 00 00 20 20 00 00 01 00 20 00 a8 10 00 00 8e 04 00 00 28 00 00 00 10 00 00 00 20 00 00 00 01 00 20 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 30 fd fd fd 96 fd fd fd d8 fd fd fd f9 fd fd fd f9 fd fd fd d7 fd fd fd 94 fe fe fe 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd 99 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 95 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd c1 ff ff ff ff fa fd f9 ff b4 d9 a7 ff 76 ba 5d ff 58 ab 3a ff 58 aa 3a ff 72 b8 59 ff ac d5 9d ff f8 fb f6 ff ff
                                                        Data Ascii: h& ( 0.v]X:X:rY
                                                        2024-10-02 17:24:16 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d8 fd fd fd 99 ff ff ff ff 92 cf fb ff 37 52 ec ff 38 46 ea ff d0 d4 fa ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 96 fe fe fe 32 ff ff ff ff f9 f9 fe ff 56 62 ed ff 35 43 ea ff 3b 49 eb ff 95 9c f4 ff cf d2 fa ff d1 d4 fa ff 96 9d f4 ff 52 5e ed ff e1 e3 fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 30 00 00 00 00 fd fd fd 9d ff ff ff ff e8 ea fd ff 58 63 ee ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 6c 76 f0 ff ff ff ff ff ff ff ff ff fd fd fd 98 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd c3 ff ff ff ff f9 f9 fe ff a5 ac f6 ff 5d 69 ee ff 3c 4a
                                                        Data Ascii: 7R8F2Vb5C;IR^0Xc5C5C5C5C5C5Clv]i<J
                                                        2024-10-02 17:24:16 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff fd fd fd d0 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd fd fd 8b ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff b1 d8 a3 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 60 a5 35 ff ca 8e 3e ff f9 c1 9f ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 87 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 25 fd fd fd fb ff ff ff ff ff ff ff ff ff ff ff ff c2 e0 b7 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 6e b6 54 ff 9f ce 8d ff b7 da aa ff b8 db ab ff a5 d2 95 ff 7b bc 64 ff 54 a8 35 ff 53 a8 34 ff 77 a0 37 ff e3 89 41 ff f4 85 42 ff f4 85 42 ff
                                                        Data Ascii: S4S4S4S4S4S4S4S4S4S4S4S4S4S4`5>%S4S4S4S4S4S4nT{dT5S4w7ABB
                                                        2024-10-02 17:24:16 UTC1390INData Raw: ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff fb d5 bf ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd ea fd fd fd cb ff ff ff ff ff ff ff ff ff ff ff ff 46 cd fc ff 05 bc fb ff 05 bc fb ff 05 bc fb ff 21 ae f9 ff fb fb ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd c8 fd fd fd 9c ff ff ff ff ff ff ff ff ff ff ff ff 86 df fd ff 05 bc fb ff 05 bc fb ff 15 93 f5 ff 34 49 eb ff b3 b8 f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                        Data Ascii: BBBBBBF!4I
                                                        2024-10-02 17:24:16 UTC575INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d2 fe fe fe 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd 8d fd fd fd fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd fb fd fd fd 8b fe fe fe 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 27 fd fd fd 9f fd fd fd f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                        Data Ascii: $'


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        10192.168.2.44977420.12.23.50443
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:24:20 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=4BOnfg3sDZ1+ln5&MD=7mmXW1cb HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                        Host: slscr.update.microsoft.com
                                                        2024-10-02 17:24:20 UTC560INHTTP/1.1 200 OK
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Content-Type: application/octet-stream
                                                        Expires: -1
                                                        Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                        ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                                                        MS-CorrelationId: 6f516bf1-ed7a-44ed-bf48-f1ea5b8a1365
                                                        MS-RequestId: c2a1ee90-19a2-42d5-bedb-f767d6349af1
                                                        MS-CV: mHQUKyGfCUeoq/wK.0
                                                        X-Microsoft-SLSClientCache: 2880
                                                        Content-Disposition: attachment; filename=environment.cab
                                                        X-Content-Type-Options: nosniff
                                                        Date: Wed, 02 Oct 2024 17:24:19 GMT
                                                        Connection: close
                                                        Content-Length: 24490
                                                        2024-10-02 17:24:20 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                                                        Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                                                        2024-10-02 17:24:20 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                                                        Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        11192.168.2.449779142.250.184.2064437980C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:24:21 UTC1299OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1224
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: text/plain;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=vqgYLiANKHTkc6WX5XgaDxk4LZpfrK-Sm0UZ5ic_OYQbh3PBc31yZv-MEP4nCOcieycRFHyL-mYtD73GJ5Ej9mGwXeVfAcaPfhiBbrvOBq1gY15oTr9fTaqYH2-GIMUBGpBbuAwSTJiJ-s1UNAdPvIhPBM9dDiRFzeeYK7dX-pYHMfBF19A
                                                        2024-10-02 17:24:21 UTC1224OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 34 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 35 35 38 2c 5b 5b 22 31 37 32 37 38 38 39 38 34 39 30 30 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,null,null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[4,0,0,0,0]]],558,[["1727889849000",null,null,null,
                                                        2024-10-02 17:24:22 UTC941INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=ycaOmyG38Yc1TOVc4n4vBRABGwLsCu5PqXi2LtBJ7GPUdwUXwY9k1wAGEfn4QrLJEZUFpEZAxFTL65DgtN0cdFh0sM6q_BOM-COsBN37L2utc5-5BJuUkaRRgL_TvX99pEzMmi4YCckLr7wBlCv0vy3fBk5oyFcM7sJw4ua59XkELLY3ijRruo1AoBc; expires=Thu, 03-Apr-2025 17:24:22 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 17:24:22 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Wed, 02 Oct 2024 17:24:22 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 17:24:22 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 17:24:22 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        12192.168.2.462748142.250.184.2064437980C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:24:44 UTC1330OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1340
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=ycaOmyG38Yc1TOVc4n4vBRABGwLsCu5PqXi2LtBJ7GPUdwUXwY9k1wAGEfn4QrLJEZUFpEZAxFTL65DgtN0cdFh0sM6q_BOM-COsBN37L2utc5-5BJuUkaRRgL_TvX99pEzMmi4YCckLr7wBlCv0vy3fBk5oyFcM7sJw4ua59XkELLY3ijRruo1AoBc
                                                        2024-10-02 17:24:44 UTC1340OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 39 38 38 32 36 30 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727889882600",null,null,null
                                                        2024-10-02 17:24:44 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 17:24:44 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 17:24:44 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 17:24:44 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        13192.168.2.462747142.250.184.2064437980C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:24:44 UTC1330OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1281
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=ycaOmyG38Yc1TOVc4n4vBRABGwLsCu5PqXi2LtBJ7GPUdwUXwY9k1wAGEfn4QrLJEZUFpEZAxFTL65DgtN0cdFh0sM6q_BOM-COsBN37L2utc5-5BJuUkaRRgL_TvX99pEzMmi4YCckLr7wBlCv0vy3fBk5oyFcM7sJw4ua59XkELLY3ijRruo1AoBc
                                                        2024-10-02 17:24:44 UTC1281OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 38 38 39 38 38 32 36 36 33 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727889882663",null,null,null
                                                        2024-10-02 17:24:44 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 17:24:44 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 17:24:44 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 17:24:44 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        14192.168.2.462749142.250.184.2064437980C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:24:46 UTC1290OUTPOST /log?hasfast=true&authuser=0&format=json HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1029
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        Content-Type: text/plain;charset=UTF-8
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiSocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: no-cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=ycaOmyG38Yc1TOVc4n4vBRABGwLsCu5PqXi2LtBJ7GPUdwUXwY9k1wAGEfn4QrLJEZUFpEZAxFTL65DgtN0cdFh0sM6q_BOM-COsBN37L2utc5-5BJuUkaRRgL_TvX99pEzMmi4YCckLr7wBlCv0vy3fBk5oyFcM7sJw4ua59XkELLY3ijRruo1AoBc
                                                        2024-10-02 17:24:46 UTC1029OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 62 6f 71 5f 69 64 65 6e 74 69 74 79 66 72 6f 6e 74 65 6e 64 61 75 74 68 75 69 73 65 72 76 65 72 5f 32 30 32 34 30 39 32 39 2e 30 37 5f 70 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 33 2c 30 2c 30
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"boq_identityfrontendauthuiserver_20240929.07_p0",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[3,0,0
                                                        2024-10-02 17:24:46 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Wed, 02 Oct 2024 17:24:46 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-10-02 17:24:46 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-10-02 17:24:46 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        15192.168.2.46275020.12.23.50443
                                                        TimestampBytes transferredDirectionData
                                                        2024-10-02 17:24:58 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=4BOnfg3sDZ1+ln5&MD=7mmXW1cb HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                        Host: slscr.update.microsoft.com
                                                        2024-10-02 17:24:58 UTC560INHTTP/1.1 200 OK
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Content-Type: application/octet-stream
                                                        Expires: -1
                                                        Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                        ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                                                        MS-CorrelationId: 23f83443-f2ef-4c15-ac5c-d9e866404c40
                                                        MS-RequestId: 3f442231-f2f7-436e-85da-d086c325bf71
                                                        MS-CV: AjeluFmVQUahaUep.0
                                                        X-Microsoft-SLSClientCache: 1440
                                                        Content-Disposition: attachment; filename=environment.cab
                                                        X-Content-Type-Options: nosniff
                                                        Date: Wed, 02 Oct 2024 17:24:57 GMT
                                                        Connection: close
                                                        Content-Length: 30005
                                                        2024-10-02 17:24:58 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                                                        Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                                                        2024-10-02 17:24:58 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                                                        Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:13:23:58
                                                        Start date:02/10/2024
                                                        Path:C:\Users\user\Desktop\file.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\file.exe"
                                                        Imagebase:0x770000
                                                        File size:918'528 bytes
                                                        MD5 hash:1CC0EEC2A3105DBF316FDC0FBAAC2BC9
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:1
                                                        Start time:13:23:59
                                                        Start date:02/10/2024
                                                        Path:C:\Windows\SysWOW64\taskkill.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:taskkill /F /IM chrome.exe /T
                                                        Imagebase:0xca0000
                                                        File size:74'240 bytes
                                                        MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:2
                                                        Start time:13:23:59
                                                        Start date:02/10/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff7699e0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:3
                                                        Start time:13:24:00
                                                        Start date:02/10/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-infobars
                                                        Imagebase:0x7ff76e190000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:4
                                                        Start time:13:24:01
                                                        Start date:02/10/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 --field-trial-handle=2356,i,8685252082371654683,15440142383956627020,262144 /prefetch:8
                                                        Imagebase:0x7ff76e190000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:6
                                                        Start time:13:24:12
                                                        Start date:02/10/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5372 --field-trial-handle=2356,i,8685252082371654683,15440142383956627020,262144 /prefetch:8
                                                        Imagebase:0x7ff76e190000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:7
                                                        Start time:13:24:12
                                                        Start date:02/10/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=2356,i,8685252082371654683,15440142383956627020,262144 /prefetch:8
                                                        Imagebase:0x7ff76e190000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:2.1%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:5%
                                                          Total number of Nodes:1597
                                                          Total number of Limit Nodes:48
                                                          execution_graph 93912 772e37 93991 77a961 93912->93991 93916 772e6b 94010 773a5a 93916->94010 93918 772e7f 94017 779cb3 93918->94017 93923 772ead 94045 77a8c7 22 API calls __fread_nolock 93923->94045 93924 7b2cb0 94068 7e2cf9 93924->94068 93926 7b2cc3 93928 7b2ccf 93926->93928 94094 774f39 93926->94094 93932 774f39 68 API calls 93928->93932 93929 772ec3 94046 776f88 22 API calls 93929->94046 93934 7b2ce5 93932->93934 93933 772ecf 93935 779cb3 22 API calls 93933->93935 94100 773084 22 API calls 93934->94100 93936 772edc 93935->93936 94047 77a81b 41 API calls 93936->94047 93939 772eec 93941 779cb3 22 API calls 93939->93941 93940 7b2d02 94101 773084 22 API calls 93940->94101 93942 772f12 93941->93942 94048 77a81b 41 API calls 93942->94048 93945 7b2d1e 93946 773a5a 24 API calls 93945->93946 93947 7b2d44 93946->93947 94102 773084 22 API calls 93947->94102 93948 772f21 93951 77a961 22 API calls 93948->93951 93950 7b2d50 94103 77a8c7 22 API calls __fread_nolock 93950->94103 93953 772f3f 93951->93953 94049 773084 22 API calls 93953->94049 93954 7b2d5e 94104 773084 22 API calls 93954->94104 93957 772f4b 94050 794a28 40 API calls 2 library calls 93957->94050 93958 7b2d6d 94105 77a8c7 22 API calls __fread_nolock 93958->94105 93960 772f59 93960->93934 93961 772f63 93960->93961 94051 794a28 40 API calls 2 library calls 93961->94051 93964 772f6e 93964->93940 93966 772f78 93964->93966 93965 7b2d83 94106 773084 22 API calls 93965->94106 94052 794a28 40 API calls 2 library calls 93966->94052 93969 7b2d90 93970 772f83 93970->93945 93971 772f8d 93970->93971 94053 794a28 40 API calls 2 library calls 93971->94053 93973 772f98 93974 772fdc 93973->93974 94054 773084 22 API calls 93973->94054 93974->93958 93975 772fe8 93974->93975 93975->93969 94057 7763eb 93975->94057 93978 772fbf 94055 77a8c7 22 API calls __fread_nolock 93978->94055 93982 772fcd 94056 773084 22 API calls 93982->94056 93983 773006 94064 7770b0 23 API calls 93983->94064 93988 773021 93989 773065 93988->93989 94065 776f88 22 API calls 93988->94065 94066 7770b0 23 API calls 93988->94066 94067 773084 22 API calls 93988->94067 94107 78fe0b 93991->94107 93993 77a976 94117 78fddb 93993->94117 93995 772e4d 93996 774ae3 93995->93996 93997 774af0 __wsopen_s 93996->93997 93999 774b22 93997->93999 94145 776b57 93997->94145 94006 774b58 93999->94006 94142 774c6d 93999->94142 94001 774c6d 22 API calls 94001->94006 94002 779cb3 22 API calls 94004 774c52 94002->94004 94003 779cb3 22 API calls 94003->94006 94005 77515f 22 API calls 94004->94005 94008 774c5e 94005->94008 94006->94001 94006->94003 94009 774c29 94006->94009 94157 77515f 94006->94157 94008->93916 94009->94002 94009->94008 94174 7b1f50 94010->94174 94013 779cb3 22 API calls 94014 773a8d 94013->94014 94176 773aa2 94014->94176 94016 773a97 94016->93918 94018 779cc2 _wcslen 94017->94018 94019 78fe0b 22 API calls 94018->94019 94020 779cea __fread_nolock 94019->94020 94021 78fddb 22 API calls 94020->94021 94022 772e8c 94021->94022 94023 774ecb 94022->94023 94196 774e90 LoadLibraryA 94023->94196 94028 774ef6 LoadLibraryExW 94204 774e59 LoadLibraryA 94028->94204 94029 7b3ccf 94030 774f39 68 API calls 94029->94030 94032 7b3cd6 94030->94032 94034 774e59 3 API calls 94032->94034 94036 7b3cde 94034->94036 94226 7750f5 40 API calls __fread_nolock 94036->94226 94037 774f20 94037->94036 94038 774f2c 94037->94038 94039 774f39 68 API calls 94038->94039 94041 772ea5 94039->94041 94041->93923 94041->93924 94042 7b3cf5 94227 7e28fe 27 API calls 94042->94227 94044 7b3d05 94045->93929 94046->93933 94047->93939 94048->93948 94049->93957 94050->93960 94051->93964 94052->93970 94053->93973 94054->93978 94055->93982 94056->93974 94058 7763f3 94057->94058 94059 78fddb 22 API calls 94058->94059 94060 776401 94059->94060 94304 776a26 22 API calls 94060->94304 94062 772ff8 94063 776a50 22 API calls 94062->94063 94063->93983 94064->93988 94065->93988 94066->93988 94067->93988 94069 7e2d15 94068->94069 94305 77511f 64 API calls 94069->94305 94071 7e2d29 94306 7e2e66 75 API calls 94071->94306 94073 7e2d3b 94074 7e2d3f 94073->94074 94307 7750f5 40 API calls __fread_nolock 94073->94307 94074->93926 94076 7e2d56 94308 7750f5 40 API calls __fread_nolock 94076->94308 94078 7e2d66 94309 7750f5 40 API calls __fread_nolock 94078->94309 94080 7e2d81 94310 7750f5 40 API calls __fread_nolock 94080->94310 94082 7e2d9c 94311 77511f 64 API calls 94082->94311 94084 7e2db3 94085 79ea0c ___std_exception_copy 21 API calls 94084->94085 94086 7e2dba 94085->94086 94087 79ea0c ___std_exception_copy 21 API calls 94086->94087 94088 7e2dc4 94087->94088 94312 7750f5 40 API calls __fread_nolock 94088->94312 94090 7e2dd8 94313 7e28fe 27 API calls 94090->94313 94092 7e2dee 94092->94074 94314 7e22ce 94092->94314 94095 774f43 94094->94095 94097 774f4a 94094->94097 94096 79e678 67 API calls 94095->94096 94096->94097 94098 774f6a FreeLibrary 94097->94098 94099 774f59 94097->94099 94098->94099 94099->93928 94100->93940 94101->93945 94102->93950 94103->93954 94104->93958 94105->93965 94106->93969 94109 78fddb 94107->94109 94110 78fdfa 94109->94110 94112 78fdfc 94109->94112 94127 79ea0c 94109->94127 94134 794ead 7 API calls 2 library calls 94109->94134 94110->93993 94113 79066d 94112->94113 94135 7932a4 RaiseException 94112->94135 94136 7932a4 RaiseException 94113->94136 94115 79068a 94115->93993 94120 78fde0 94117->94120 94118 79ea0c ___std_exception_copy 21 API calls 94118->94120 94119 78fdfa 94119->93995 94120->94118 94120->94119 94122 78fdfc 94120->94122 94139 794ead 7 API calls 2 library calls 94120->94139 94123 79066d 94122->94123 94140 7932a4 RaiseException 94122->94140 94141 7932a4 RaiseException 94123->94141 94125 79068a 94125->93995 94132 7a3820 FindHandler 94127->94132 94128 7a385e 94138 79f2d9 20 API calls __dosmaperr 94128->94138 94129 7a3849 RtlAllocateHeap 94131 7a385c 94129->94131 94129->94132 94131->94109 94132->94128 94132->94129 94137 794ead 7 API calls 2 library calls 94132->94137 94134->94109 94135->94113 94136->94115 94137->94132 94138->94131 94139->94120 94140->94123 94141->94125 94163 77aec9 94142->94163 94144 774c78 94144->93999 94146 776b67 _wcslen 94145->94146 94147 7b4ba1 94145->94147 94150 776ba2 94146->94150 94151 776b7d 94146->94151 94170 7793b2 94147->94170 94149 7b4baa 94149->94149 94153 78fddb 22 API calls 94150->94153 94169 776f34 22 API calls 94151->94169 94155 776bae 94153->94155 94154 776b85 __fread_nolock 94154->93999 94156 78fe0b 22 API calls 94155->94156 94156->94154 94158 77516e 94157->94158 94162 77518f __fread_nolock 94157->94162 94160 78fe0b 22 API calls 94158->94160 94159 78fddb 22 API calls 94161 7751a2 94159->94161 94160->94162 94161->94006 94162->94159 94164 77aedc 94163->94164 94168 77aed9 __fread_nolock 94163->94168 94165 78fddb 22 API calls 94164->94165 94166 77aee7 94165->94166 94167 78fe0b 22 API calls 94166->94167 94167->94168 94168->94144 94169->94154 94171 7793c0 94170->94171 94173 7793c9 __fread_nolock 94170->94173 94172 77aec9 22 API calls 94171->94172 94171->94173 94172->94173 94173->94149 94175 773a67 GetModuleFileNameW 94174->94175 94175->94013 94177 7b1f50 __wsopen_s 94176->94177 94178 773aaf GetFullPathNameW 94177->94178 94179 773ace 94178->94179 94180 773ae9 94178->94180 94182 776b57 22 API calls 94179->94182 94190 77a6c3 94180->94190 94183 773ada 94182->94183 94186 7737a0 94183->94186 94187 7737ae 94186->94187 94188 7793b2 22 API calls 94187->94188 94189 7737c2 94188->94189 94189->94016 94191 77a6d0 94190->94191 94192 77a6dd 94190->94192 94191->94183 94193 78fddb 22 API calls 94192->94193 94194 77a6e7 94193->94194 94195 78fe0b 22 API calls 94194->94195 94195->94191 94197 774ec6 94196->94197 94198 774ea8 GetProcAddress 94196->94198 94201 79e5eb 94197->94201 94199 774eb8 94198->94199 94199->94197 94200 774ebf FreeLibrary 94199->94200 94200->94197 94228 79e52a 94201->94228 94203 774eea 94203->94028 94203->94029 94205 774e6e GetProcAddress 94204->94205 94206 774e8d 94204->94206 94207 774e7e 94205->94207 94209 774f80 94206->94209 94207->94206 94208 774e86 FreeLibrary 94207->94208 94208->94206 94210 78fe0b 22 API calls 94209->94210 94211 774f95 94210->94211 94290 775722 94211->94290 94213 774fa1 __fread_nolock 94214 7750a5 94213->94214 94215 7b3d1d 94213->94215 94225 774fdc 94213->94225 94293 7742a2 CreateStreamOnHGlobal 94214->94293 94301 7e304d 74 API calls 94215->94301 94218 7b3d22 94302 77511f 64 API calls 94218->94302 94221 7b3d45 94303 7750f5 40 API calls __fread_nolock 94221->94303 94224 77506e messages 94224->94037 94225->94218 94225->94224 94299 7750f5 40 API calls __fread_nolock 94225->94299 94300 77511f 64 API calls 94225->94300 94226->94042 94227->94044 94231 79e536 ___scrt_is_nonwritable_in_current_image 94228->94231 94229 79e544 94253 79f2d9 20 API calls __dosmaperr 94229->94253 94231->94229 94233 79e574 94231->94233 94232 79e549 94254 7a27ec 26 API calls _strftime 94232->94254 94235 79e579 94233->94235 94236 79e586 94233->94236 94255 79f2d9 20 API calls __dosmaperr 94235->94255 94245 7a8061 94236->94245 94239 79e58f 94240 79e5a2 94239->94240 94241 79e595 94239->94241 94257 79e5d4 LeaveCriticalSection __fread_nolock 94240->94257 94256 79f2d9 20 API calls __dosmaperr 94241->94256 94242 79e554 __fread_nolock 94242->94203 94246 7a806d ___scrt_is_nonwritable_in_current_image 94245->94246 94258 7a2f5e EnterCriticalSection 94246->94258 94248 7a807b 94259 7a80fb 94248->94259 94252 7a80ac __fread_nolock 94252->94239 94253->94232 94254->94242 94255->94242 94256->94242 94257->94242 94258->94248 94260 7a811e 94259->94260 94261 7a8177 94260->94261 94268 7a8088 94260->94268 94275 79918d EnterCriticalSection 94260->94275 94276 7991a1 LeaveCriticalSection 94260->94276 94277 7a4c7d 94261->94277 94266 7a8189 94266->94268 94285 7a3405 11 API calls 2 library calls 94266->94285 94272 7a80b7 94268->94272 94269 7a81a8 94286 79918d EnterCriticalSection 94269->94286 94289 7a2fa6 LeaveCriticalSection 94272->94289 94274 7a80be 94274->94252 94275->94260 94276->94260 94282 7a4c8a FindHandler 94277->94282 94278 7a4cca 94288 79f2d9 20 API calls __dosmaperr 94278->94288 94279 7a4cb5 RtlAllocateHeap 94280 7a4cc8 94279->94280 94279->94282 94284 7a29c8 20 API calls __dosmaperr 94280->94284 94282->94278 94282->94279 94287 794ead 7 API calls 2 library calls 94282->94287 94284->94266 94285->94269 94286->94268 94287->94282 94288->94280 94289->94274 94291 78fddb 22 API calls 94290->94291 94292 775734 94291->94292 94292->94213 94294 7742bc FindResourceExW 94293->94294 94298 7742d9 94293->94298 94295 7b35ba LoadResource 94294->94295 94294->94298 94296 7b35cf SizeofResource 94295->94296 94295->94298 94297 7b35e3 LockResource 94296->94297 94296->94298 94297->94298 94298->94225 94299->94225 94300->94225 94301->94218 94302->94221 94303->94224 94304->94062 94305->94071 94306->94073 94307->94076 94308->94078 94309->94080 94310->94082 94311->94084 94312->94090 94313->94092 94315 7e22e7 94314->94315 94316 7e22d9 94314->94316 94318 7e232c 94315->94318 94319 79e5eb 29 API calls 94315->94319 94342 7e22f0 94315->94342 94317 79e5eb 29 API calls 94316->94317 94317->94315 94343 7e2557 40 API calls __fread_nolock 94318->94343 94321 7e2311 94319->94321 94321->94318 94323 7e231a 94321->94323 94322 7e2370 94324 7e2374 94322->94324 94325 7e2395 94322->94325 94323->94342 94351 79e678 94323->94351 94326 7e2381 94324->94326 94329 79e678 67 API calls 94324->94329 94344 7e2171 94325->94344 94331 79e678 67 API calls 94326->94331 94326->94342 94329->94326 94330 7e239d 94332 7e23c3 94330->94332 94333 7e23a3 94330->94333 94331->94342 94364 7e23f3 74 API calls 94332->94364 94334 7e23b0 94333->94334 94336 79e678 67 API calls 94333->94336 94337 79e678 67 API calls 94334->94337 94334->94342 94336->94334 94337->94342 94338 7e23de 94341 79e678 67 API calls 94338->94341 94338->94342 94339 7e23ca 94339->94338 94340 79e678 67 API calls 94339->94340 94340->94338 94341->94342 94342->94074 94343->94322 94345 79ea0c ___std_exception_copy 21 API calls 94344->94345 94346 7e217f 94345->94346 94347 79ea0c ___std_exception_copy 21 API calls 94346->94347 94348 7e2190 94347->94348 94349 79ea0c ___std_exception_copy 21 API calls 94348->94349 94350 7e219c 94349->94350 94350->94330 94352 79e684 ___scrt_is_nonwritable_in_current_image 94351->94352 94353 79e6aa 94352->94353 94354 79e695 94352->94354 94363 79e6a5 __fread_nolock 94353->94363 94365 79918d EnterCriticalSection 94353->94365 94382 79f2d9 20 API calls __dosmaperr 94354->94382 94356 79e69a 94383 7a27ec 26 API calls _strftime 94356->94383 94359 79e6c6 94366 79e602 94359->94366 94361 79e6d1 94384 79e6ee LeaveCriticalSection __fread_nolock 94361->94384 94363->94342 94364->94339 94365->94359 94367 79e60f 94366->94367 94368 79e624 94366->94368 94417 79f2d9 20 API calls __dosmaperr 94367->94417 94373 79e61f 94368->94373 94385 79dc0b 94368->94385 94370 79e614 94418 7a27ec 26 API calls _strftime 94370->94418 94373->94361 94378 79e646 94402 7a862f 94378->94402 94382->94356 94383->94363 94384->94363 94386 79dc1f 94385->94386 94387 79dc23 94385->94387 94391 7a4d7a 94386->94391 94387->94386 94388 79d955 __fread_nolock 26 API calls 94387->94388 94389 79dc43 94388->94389 94420 7a59be 62 API calls 5 library calls 94389->94420 94392 79e640 94391->94392 94393 7a4d90 94391->94393 94395 79d955 94392->94395 94393->94392 94421 7a29c8 20 API calls __dosmaperr 94393->94421 94396 79d961 94395->94396 94397 79d976 94395->94397 94422 79f2d9 20 API calls __dosmaperr 94396->94422 94397->94378 94399 79d966 94423 7a27ec 26 API calls _strftime 94399->94423 94401 79d971 94401->94378 94403 7a863e 94402->94403 94404 7a8653 94402->94404 94427 79f2c6 20 API calls __dosmaperr 94403->94427 94406 7a868e 94404->94406 94411 7a867a 94404->94411 94429 79f2c6 20 API calls __dosmaperr 94406->94429 94408 7a8643 94428 79f2d9 20 API calls __dosmaperr 94408->94428 94409 7a8693 94430 79f2d9 20 API calls __dosmaperr 94409->94430 94424 7a8607 94411->94424 94414 7a869b 94431 7a27ec 26 API calls _strftime 94414->94431 94415 79e64c 94415->94373 94419 7a29c8 20 API calls __dosmaperr 94415->94419 94417->94370 94418->94373 94419->94373 94420->94386 94421->94392 94422->94399 94423->94401 94432 7a8585 94424->94432 94426 7a862b 94426->94415 94427->94408 94428->94415 94429->94409 94430->94414 94431->94415 94433 7a8591 ___scrt_is_nonwritable_in_current_image 94432->94433 94443 7a5147 EnterCriticalSection 94433->94443 94435 7a859f 94436 7a85d1 94435->94436 94437 7a85c6 94435->94437 94459 79f2d9 20 API calls __dosmaperr 94436->94459 94444 7a86ae 94437->94444 94440 7a85cc 94460 7a85fb LeaveCriticalSection __wsopen_s 94440->94460 94442 7a85ee __fread_nolock 94442->94426 94443->94435 94461 7a53c4 94444->94461 94446 7a86c4 94474 7a5333 21 API calls 2 library calls 94446->94474 94447 7a86be 94447->94446 94450 7a53c4 __wsopen_s 26 API calls 94447->94450 94458 7a86f6 94447->94458 94449 7a871c 94457 7a873e 94449->94457 94475 79f2a3 20 API calls __dosmaperr 94449->94475 94452 7a86ed 94450->94452 94451 7a53c4 __wsopen_s 26 API calls 94453 7a8702 CloseHandle 94451->94453 94455 7a53c4 __wsopen_s 26 API calls 94452->94455 94453->94446 94456 7a870e GetLastError 94453->94456 94455->94458 94456->94446 94457->94440 94458->94446 94458->94451 94459->94440 94460->94442 94462 7a53d1 94461->94462 94465 7a53e6 94461->94465 94476 79f2c6 20 API calls __dosmaperr 94462->94476 94464 7a53d6 94477 79f2d9 20 API calls __dosmaperr 94464->94477 94468 7a540b 94465->94468 94478 79f2c6 20 API calls __dosmaperr 94465->94478 94468->94447 94469 7a5416 94479 79f2d9 20 API calls __dosmaperr 94469->94479 94470 7a53de 94470->94447 94472 7a541e 94480 7a27ec 26 API calls _strftime 94472->94480 94474->94449 94475->94457 94476->94464 94477->94470 94478->94469 94479->94472 94480->94470 94481 773156 94484 773170 94481->94484 94485 773187 94484->94485 94486 77318c 94485->94486 94487 7731eb 94485->94487 94523 7731e9 94485->94523 94488 773265 PostQuitMessage 94486->94488 94489 773199 94486->94489 94491 7b2dfb 94487->94491 94492 7731f1 94487->94492 94514 77316a 94488->94514 94494 7731a4 94489->94494 94495 7b2e7c 94489->94495 94490 7731d0 DefWindowProcW 94490->94514 94543 7718e2 10 API calls 94491->94543 94496 77321d SetTimer RegisterWindowMessageW 94492->94496 94497 7731f8 94492->94497 94499 7b2e68 94494->94499 94500 7731ae 94494->94500 94556 7dbf30 34 API calls ___scrt_fastfail 94495->94556 94501 773246 CreatePopupMenu 94496->94501 94496->94514 94503 773201 KillTimer 94497->94503 94504 7b2d9c 94497->94504 94498 7b2e1c 94544 78e499 42 API calls 94498->94544 94533 7dc161 94499->94533 94507 7b2e4d 94500->94507 94508 7731b9 94500->94508 94501->94514 94529 7730f2 94503->94529 94510 7b2da1 94504->94510 94511 7b2dd7 MoveWindow 94504->94511 94507->94490 94555 7d0ad7 22 API calls 94507->94555 94515 7731c4 94508->94515 94516 773253 94508->94516 94509 7b2e8e 94509->94490 94509->94514 94517 7b2da7 94510->94517 94518 7b2dc6 SetFocus 94510->94518 94511->94514 94515->94490 94526 7730f2 Shell_NotifyIconW 94515->94526 94541 77326f 44 API calls ___scrt_fastfail 94516->94541 94517->94515 94521 7b2db0 94517->94521 94518->94514 94542 7718e2 10 API calls 94521->94542 94523->94490 94524 773263 94524->94514 94527 7b2e41 94526->94527 94545 773837 94527->94545 94530 773154 94529->94530 94531 773104 ___scrt_fastfail 94529->94531 94540 773c50 DeleteObject DestroyWindow 94530->94540 94532 773123 Shell_NotifyIconW 94531->94532 94532->94530 94534 7dc179 ___scrt_fastfail 94533->94534 94535 7dc276 94533->94535 94557 773923 94534->94557 94535->94514 94537 7dc25f KillTimer SetTimer 94537->94535 94538 7dc1a0 94538->94537 94539 7dc251 Shell_NotifyIconW 94538->94539 94539->94537 94540->94514 94541->94524 94542->94514 94543->94498 94544->94515 94546 773862 ___scrt_fastfail 94545->94546 94630 774212 94546->94630 94550 773906 Shell_NotifyIconW 94552 773923 24 API calls 94550->94552 94551 7b3386 Shell_NotifyIconW 94553 77391c 94552->94553 94553->94523 94554 7738e8 94554->94550 94554->94551 94555->94523 94556->94509 94558 773a13 94557->94558 94559 77393f 94557->94559 94558->94538 94579 776270 94559->94579 94562 7b3393 LoadStringW 94565 7b33ad 94562->94565 94563 77395a 94564 776b57 22 API calls 94563->94564 94566 77396f 94564->94566 94573 773994 ___scrt_fastfail 94565->94573 94593 77a8c7 22 API calls __fread_nolock 94565->94593 94567 7b33c9 94566->94567 94568 77397c 94566->94568 94571 776350 22 API calls 94567->94571 94568->94565 94570 773986 94568->94570 94584 776350 94570->94584 94574 7b33d7 94571->94574 94576 7739f9 Shell_NotifyIconW 94573->94576 94574->94573 94594 7733c6 94574->94594 94576->94558 94577 7b33f9 94578 7733c6 22 API calls 94577->94578 94578->94573 94580 78fe0b 22 API calls 94579->94580 94581 776295 94580->94581 94582 78fddb 22 API calls 94581->94582 94583 77394d 94582->94583 94583->94562 94583->94563 94585 776362 94584->94585 94586 7b4a51 94584->94586 94603 776373 94585->94603 94613 774a88 22 API calls __fread_nolock 94586->94613 94589 7b4a5b 94591 7b4a67 94589->94591 94614 77a8c7 22 API calls __fread_nolock 94589->94614 94590 77636e 94590->94573 94593->94573 94595 7b30bb 94594->94595 94596 7733dd 94594->94596 94598 78fddb 22 API calls 94595->94598 94620 7733ee 94596->94620 94599 7b30c5 _wcslen 94598->94599 94601 78fe0b 22 API calls 94599->94601 94600 7733e8 94600->94577 94602 7b30fe __fread_nolock 94601->94602 94605 776382 94603->94605 94610 7763b6 __fread_nolock 94603->94610 94604 7b4a82 94607 78fddb 22 API calls 94604->94607 94605->94604 94606 7763a9 94605->94606 94605->94610 94615 77a587 94606->94615 94609 7b4a91 94607->94609 94611 78fe0b 22 API calls 94609->94611 94610->94590 94612 7b4ac5 __fread_nolock 94611->94612 94613->94589 94614->94591 94616 77a59d 94615->94616 94619 77a598 __fread_nolock 94615->94619 94617 78fe0b 22 API calls 94616->94617 94618 7bf80f 94616->94618 94617->94619 94619->94610 94621 7733fe _wcslen 94620->94621 94622 7b311d 94621->94622 94623 773411 94621->94623 94625 78fddb 22 API calls 94622->94625 94624 77a587 22 API calls 94623->94624 94626 77341e __fread_nolock 94624->94626 94627 7b3127 94625->94627 94626->94600 94628 78fe0b 22 API calls 94627->94628 94629 7b3157 __fread_nolock 94628->94629 94631 7738b7 94630->94631 94632 7b35a4 94630->94632 94631->94554 94634 7dc874 42 API calls _strftime 94631->94634 94632->94631 94633 7b35ad DestroyIcon 94632->94633 94633->94631 94634->94554 94635 7903fb 94636 790407 ___scrt_is_nonwritable_in_current_image 94635->94636 94664 78feb1 94636->94664 94638 79040e 94639 790561 94638->94639 94642 790438 94638->94642 94694 79083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 94639->94694 94641 790568 94687 794e52 94641->94687 94653 790477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 94642->94653 94675 7a247d 94642->94675 94649 790457 94651 7904d8 94683 790959 94651->94683 94653->94651 94690 794e1a 38 API calls 3 library calls 94653->94690 94655 7904de 94656 7904f3 94655->94656 94691 790992 GetModuleHandleW 94656->94691 94658 7904fa 94658->94641 94659 7904fe 94658->94659 94660 790507 94659->94660 94692 794df5 28 API calls _abort 94659->94692 94693 790040 13 API calls 2 library calls 94660->94693 94663 79050f 94663->94649 94665 78feba 94664->94665 94696 790698 IsProcessorFeaturePresent 94665->94696 94667 78fec6 94697 792c94 10 API calls 3 library calls 94667->94697 94669 78fecb 94670 78fecf 94669->94670 94698 7a2317 94669->94698 94670->94638 94673 78fee6 94673->94638 94678 7a2494 94675->94678 94676 790a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 94677 790451 94676->94677 94677->94649 94679 7a2421 94677->94679 94678->94676 94682 7a2450 94679->94682 94680 790a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 94681 7a2479 94680->94681 94681->94653 94682->94680 94758 792340 94683->94758 94685 79096c GetStartupInfoW 94686 79097f 94685->94686 94686->94655 94760 794bcf 94687->94760 94690->94651 94691->94658 94692->94660 94693->94663 94694->94641 94696->94667 94697->94669 94702 7ad1f6 94698->94702 94701 792cbd 8 API calls 3 library calls 94701->94670 94704 7ad20f 94702->94704 94706 7ad213 94702->94706 94720 790a8c 94704->94720 94705 78fed8 94705->94673 94705->94701 94706->94704 94708 7a4bfb 94706->94708 94709 7a4c07 ___scrt_is_nonwritable_in_current_image 94708->94709 94727 7a2f5e EnterCriticalSection 94709->94727 94711 7a4c0e 94728 7a50af 94711->94728 94713 7a4c1d 94714 7a4c2c 94713->94714 94741 7a4a8f 29 API calls 94713->94741 94743 7a4c48 LeaveCriticalSection _abort 94714->94743 94717 7a4c27 94742 7a4b45 GetStdHandle GetFileType 94717->94742 94718 7a4c3d __fread_nolock 94718->94706 94721 790a95 94720->94721 94722 790a97 IsProcessorFeaturePresent 94720->94722 94721->94705 94724 790c5d 94722->94724 94757 790c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 94724->94757 94726 790d40 94726->94705 94727->94711 94729 7a50bb ___scrt_is_nonwritable_in_current_image 94728->94729 94730 7a50c8 94729->94730 94731 7a50df 94729->94731 94752 79f2d9 20 API calls __dosmaperr 94730->94752 94744 7a2f5e EnterCriticalSection 94731->94744 94734 7a50cd 94753 7a27ec 26 API calls _strftime 94734->94753 94736 7a50d7 __fread_nolock 94736->94713 94737 7a5117 94754 7a513e LeaveCriticalSection _abort 94737->94754 94739 7a50eb 94739->94737 94745 7a5000 94739->94745 94741->94717 94742->94714 94743->94718 94744->94739 94746 7a4c7d FindHandler 20 API calls 94745->94746 94747 7a5012 94746->94747 94751 7a501f 94747->94751 94755 7a3405 11 API calls 2 library calls 94747->94755 94750 7a5071 94750->94739 94756 7a29c8 20 API calls __dosmaperr 94751->94756 94752->94734 94753->94736 94754->94736 94755->94747 94756->94750 94757->94726 94759 792357 94758->94759 94759->94685 94759->94759 94761 794bdb FindHandler 94760->94761 94762 794be2 94761->94762 94763 794bf4 94761->94763 94799 794d29 GetModuleHandleW 94762->94799 94784 7a2f5e EnterCriticalSection 94763->94784 94766 794be7 94766->94763 94800 794d6d GetModuleHandleExW 94766->94800 94767 794c99 94788 794cd9 94767->94788 94771 794bfb 94771->94767 94773 794c70 94771->94773 94785 7a21a8 94771->94785 94774 794c88 94773->94774 94779 7a2421 _abort 5 API calls 94773->94779 94780 7a2421 _abort 5 API calls 94774->94780 94775 794ce2 94808 7b1d29 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 94775->94808 94776 794cb6 94791 794ce8 94776->94791 94779->94774 94780->94767 94784->94771 94809 7a1ee1 94785->94809 94829 7a2fa6 LeaveCriticalSection 94788->94829 94790 794cb2 94790->94775 94790->94776 94830 7a360c 94791->94830 94794 794d16 94797 794d6d _abort 8 API calls 94794->94797 94795 794cf6 GetPEB 94795->94794 94796 794d06 GetCurrentProcess TerminateProcess 94795->94796 94796->94794 94798 794d1e ExitProcess 94797->94798 94799->94766 94801 794dba 94800->94801 94802 794d97 GetProcAddress 94800->94802 94804 794dc9 94801->94804 94805 794dc0 FreeLibrary 94801->94805 94803 794dac 94802->94803 94803->94801 94806 790a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 94804->94806 94805->94804 94807 794bf3 94806->94807 94807->94763 94812 7a1e90 94809->94812 94811 7a1f05 94811->94773 94813 7a1e9c ___scrt_is_nonwritable_in_current_image 94812->94813 94820 7a2f5e EnterCriticalSection 94813->94820 94815 7a1eaa 94821 7a1f31 94815->94821 94819 7a1ec8 __fread_nolock 94819->94811 94820->94815 94824 7a1f59 94821->94824 94825 7a1f51 94821->94825 94822 790a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 94823 7a1eb7 94822->94823 94827 7a1ed5 LeaveCriticalSection _abort 94823->94827 94824->94825 94828 7a29c8 20 API calls __dosmaperr 94824->94828 94825->94822 94827->94819 94828->94825 94829->94790 94831 7a3631 94830->94831 94832 7a3627 94830->94832 94837 7a2fd7 5 API calls 2 library calls 94831->94837 94834 790a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 94832->94834 94835 794cf2 94834->94835 94835->94794 94835->94795 94836 7a3648 94836->94832 94837->94836 94838 771033 94843 774c91 94838->94843 94842 771042 94844 77a961 22 API calls 94843->94844 94845 774cff 94844->94845 94851 773af0 94845->94851 94848 774d9c 94849 771038 94848->94849 94854 7751f7 22 API calls __fread_nolock 94848->94854 94850 7900a3 29 API calls __onexit 94849->94850 94850->94842 94855 773b1c 94851->94855 94854->94848 94856 773b0f 94855->94856 94857 773b29 94855->94857 94856->94848 94857->94856 94858 773b30 RegOpenKeyExW 94857->94858 94858->94856 94859 773b4a RegQueryValueExW 94858->94859 94860 773b80 RegCloseKey 94859->94860 94861 773b6b 94859->94861 94860->94856 94861->94860 94862 77f7bf 94863 77fcb6 94862->94863 94864 77f7d3 94862->94864 94955 77aceb 23 API calls messages 94863->94955 94866 77fcc2 94864->94866 94867 78fddb 22 API calls 94864->94867 94956 77aceb 23 API calls messages 94866->94956 94869 77f7e5 94867->94869 94869->94866 94870 77fd3d 94869->94870 94871 77f83e 94869->94871 94957 7e1155 22 API calls 94870->94957 94895 77ed9d messages 94871->94895 94897 781310 94871->94897 94874 78fddb 22 API calls 94894 77ec76 messages 94874->94894 94876 77fef7 94876->94895 94959 77a8c7 22 API calls __fread_nolock 94876->94959 94878 7c4b0b 94961 7e359c 82 API calls __wsopen_s 94878->94961 94879 7c4600 94879->94895 94958 77a8c7 22 API calls __fread_nolock 94879->94958 94884 790242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94884->94894 94885 77a8c7 22 API calls 94885->94894 94887 77fbe3 94890 7c4bdc 94887->94890 94887->94895 94896 77f3ae messages 94887->94896 94888 77a961 22 API calls 94888->94894 94889 7900a3 29 API calls pre_c_initialization 94889->94894 94962 7e359c 82 API calls __wsopen_s 94890->94962 94892 7901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 94892->94894 94893 7c4beb 94963 7e359c 82 API calls __wsopen_s 94893->94963 94894->94874 94894->94876 94894->94878 94894->94879 94894->94884 94894->94885 94894->94887 94894->94888 94894->94889 94894->94892 94894->94893 94894->94895 94894->94896 94953 7801e0 348 API calls 2 library calls 94894->94953 94954 7806a0 41 API calls messages 94894->94954 94896->94895 94960 7e359c 82 API calls __wsopen_s 94896->94960 94898 7817b0 94897->94898 94899 781376 94897->94899 95039 790242 5 API calls __Init_thread_wait 94898->95039 94900 781390 94899->94900 94901 7c6331 94899->94901 94964 781940 94900->94964 95044 7f709c 348 API calls 94901->95044 94905 7817ba 94906 7817fb 94905->94906 94909 779cb3 22 API calls 94905->94909 94912 7c6346 94906->94912 94914 78182c 94906->94914 94908 7c633d 94908->94894 94917 7817d4 94909->94917 94910 781940 9 API calls 94911 7813b6 94910->94911 94911->94906 94913 7813ec 94911->94913 95045 7e359c 82 API calls __wsopen_s 94912->95045 94913->94912 94919 781408 __fread_nolock 94913->94919 95041 77aceb 23 API calls messages 94914->95041 95040 7901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94917->95040 94918 781839 95042 78d217 348 API calls 94918->95042 94919->94918 94922 7c636e 94919->94922 94930 78fddb 22 API calls 94919->94930 94931 78fe0b 22 API calls 94919->94931 94937 78152f 94919->94937 94939 7c63b2 94919->94939 94942 7c6369 94919->94942 95014 77ec40 94919->95014 95046 7e359c 82 API calls __wsopen_s 94922->95046 94924 78153c 94928 781940 9 API calls 94924->94928 94925 7c63d1 95048 7f5745 54 API calls _wcslen 94925->95048 94926 781872 95043 78faeb 23 API calls 94926->95043 94929 781549 94928->94929 94932 7c64fa 94929->94932 94934 781940 9 API calls 94929->94934 94930->94919 94931->94919 94932->94942 95050 7e359c 82 API calls __wsopen_s 94932->95050 94938 781563 94934->94938 94937->94924 94937->94925 94938->94932 94944 7815c7 messages 94938->94944 95049 77a8c7 22 API calls __fread_nolock 94938->95049 95047 7e359c 82 API calls __wsopen_s 94939->95047 94942->94894 94943 781940 9 API calls 94943->94944 94944->94926 94944->94932 94944->94942 94944->94943 94946 78167b messages 94944->94946 94974 7fa67c CreateToolhelp32Snapshot Process32FirstW 94944->94974 94994 7e5c5a 94944->94994 94999 7fabf7 94944->94999 95004 7fab67 94944->95004 95007 78f645 94944->95007 94945 78171d 94945->94894 94946->94945 95038 78ce17 22 API calls messages 94946->95038 94953->94894 94954->94894 94955->94866 94956->94870 94957->94895 94958->94895 94959->94895 94960->94895 94961->94895 94962->94893 94963->94895 94965 781981 94964->94965 94970 78195d 94964->94970 95051 790242 5 API calls __Init_thread_wait 94965->95051 94968 78198b 94968->94970 95052 7901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94968->95052 94969 788727 94973 7813a0 94969->94973 95054 7901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94969->95054 94970->94973 95053 790242 5 API calls __Init_thread_wait 94970->95053 94973->94910 94982 7fa6c3 94974->94982 94975 77a961 22 API calls 94975->94982 94976 779cb3 22 API calls 94976->94982 94978 776350 22 API calls 94978->94982 94982->94975 94982->94976 94982->94978 94983 7fa796 Process32NextW 94982->94983 95055 77525f 94982->95055 95097 777510 94982->95097 95120 78ce60 41 API calls 94982->95120 95121 7fb574 22 API calls __fread_nolock 94982->95121 94983->94982 94984 7fa7aa CloseHandle 94983->94984 94985 7763eb 22 API calls 94984->94985 94986 7fa7b9 94985->94986 95122 776a50 22 API calls 94986->95122 94988 7fa7cd 95123 7804f0 22 API calls 94988->95123 94990 7fa87d 94990->94944 94991 7fa7d9 94991->94990 94993 7804f0 22 API calls 94991->94993 95124 7762b5 22 API calls 94991->95124 94993->94991 94995 777510 53 API calls 94994->94995 94996 7e5c6d 94995->94996 95149 7ddbbe lstrlenW 94996->95149 94998 7e5c77 94998->94944 95154 7faff9 94999->95154 95001 7fac54 95001->94944 95002 7fac0c 95002->95001 95245 77aceb 23 API calls messages 95002->95245 95005 7faff9 217 API calls 95004->95005 95006 7fab79 95005->95006 95006->94944 95008 77b567 39 API calls 95007->95008 95009 78f659 95008->95009 95010 7cf2dc Sleep 95009->95010 95011 78f661 timeGetTime 95009->95011 95012 77b567 39 API calls 95011->95012 95013 78f677 95012->95013 95013->94944 95032 77ec76 messages 95014->95032 95015 790242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95015->95032 95016 78fddb 22 API calls 95016->95032 95017 7900a3 29 API calls pre_c_initialization 95017->95032 95019 77fef7 95031 77ed9d messages 95019->95031 95286 77a8c7 22 API calls __fread_nolock 95019->95286 95021 7c4b0b 95288 7e359c 82 API calls __wsopen_s 95021->95288 95022 7c4600 95022->95031 95285 77a8c7 22 API calls __fread_nolock 95022->95285 95026 77a8c7 22 API calls 95026->95032 95029 77fbe3 95029->95031 95033 7c4bdc 95029->95033 95037 77f3ae messages 95029->95037 95030 77a961 22 API calls 95030->95032 95031->94919 95032->95015 95032->95016 95032->95017 95032->95019 95032->95021 95032->95022 95032->95026 95032->95029 95032->95030 95032->95031 95035 7901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95032->95035 95036 7c4beb 95032->95036 95032->95037 95283 7801e0 348 API calls 2 library calls 95032->95283 95284 7806a0 41 API calls messages 95032->95284 95289 7e359c 82 API calls __wsopen_s 95033->95289 95035->95032 95290 7e359c 82 API calls __wsopen_s 95036->95290 95037->95031 95287 7e359c 82 API calls __wsopen_s 95037->95287 95038->94946 95039->94905 95040->94906 95041->94918 95042->94926 95043->94926 95044->94908 95045->94942 95046->94942 95047->94942 95048->94938 95049->94944 95050->94942 95051->94968 95052->94970 95053->94969 95054->94973 95056 77a961 22 API calls 95055->95056 95057 775275 95056->95057 95058 77a961 22 API calls 95057->95058 95059 77527d 95058->95059 95060 77a961 22 API calls 95059->95060 95061 775285 95060->95061 95062 77a961 22 API calls 95061->95062 95063 77528d 95062->95063 95064 7752c1 95063->95064 95065 7b3df5 95063->95065 95067 776d25 22 API calls 95064->95067 95140 77a8c7 22 API calls __fread_nolock 95065->95140 95069 7752cf 95067->95069 95068 7b3dfe 95070 77a6c3 22 API calls 95068->95070 95071 7793b2 22 API calls 95069->95071 95075 775304 95070->95075 95072 7752d9 95071->95072 95073 776d25 22 API calls 95072->95073 95072->95075 95076 7752fa 95073->95076 95074 775349 95125 776d25 95074->95125 95075->95074 95077 775325 95075->95077 95092 7b3e20 95075->95092 95080 7793b2 22 API calls 95076->95080 95077->95074 95082 774c6d 22 API calls 95077->95082 95079 77535a 95081 775370 95079->95081 95138 77a8c7 22 API calls __fread_nolock 95079->95138 95080->95075 95083 775384 95081->95083 95139 77a8c7 22 API calls __fread_nolock 95081->95139 95084 775332 95082->95084 95087 77538f 95083->95087 95142 77a8c7 22 API calls __fread_nolock 95083->95142 95084->95074 95089 776d25 22 API calls 95084->95089 95085 776b57 22 API calls 95094 7b3ee0 95085->95094 95095 77539a 95087->95095 95143 77a8c7 22 API calls __fread_nolock 95087->95143 95089->95074 95092->95085 95093 774c6d 22 API calls 95093->95094 95094->95074 95094->95093 95141 7749bd 22 API calls __fread_nolock 95094->95141 95095->94982 95098 777525 95097->95098 95114 777522 95097->95114 95099 77752d 95098->95099 95100 77755b 95098->95100 95145 7951c6 26 API calls 95099->95145 95103 77756d 95100->95103 95109 7b50f6 95100->95109 95111 7b500f 95100->95111 95146 78fb21 51 API calls 95103->95146 95104 7b510e 95104->95104 95107 78fddb 22 API calls 95110 777547 95107->95110 95108 77753d 95108->95107 95148 795183 26 API calls 95109->95148 95112 779cb3 22 API calls 95110->95112 95113 78fe0b 22 API calls 95111->95113 95119 7b5088 95111->95119 95112->95114 95115 7b5058 95113->95115 95114->94982 95116 78fddb 22 API calls 95115->95116 95117 7b507f 95116->95117 95118 779cb3 22 API calls 95117->95118 95118->95119 95147 78fb21 51 API calls 95119->95147 95120->94982 95121->94982 95122->94988 95123->94991 95124->94991 95126 776d34 95125->95126 95127 776d91 95125->95127 95126->95127 95128 776d3f 95126->95128 95129 7793b2 22 API calls 95127->95129 95130 7b4c9d 95128->95130 95131 776d5a 95128->95131 95135 776d62 __fread_nolock 95129->95135 95133 78fddb 22 API calls 95130->95133 95144 776f34 22 API calls 95131->95144 95134 7b4ca7 95133->95134 95136 78fe0b 22 API calls 95134->95136 95135->95079 95137 7b4cda 95136->95137 95138->95081 95139->95083 95140->95068 95141->95094 95142->95087 95143->95095 95144->95135 95145->95108 95146->95108 95147->95109 95148->95104 95150 7ddbdc GetFileAttributesW 95149->95150 95151 7ddc06 95149->95151 95150->95151 95152 7ddbe8 FindFirstFileW 95150->95152 95151->94998 95152->95151 95153 7ddbf9 FindClose 95152->95153 95153->95151 95155 7fb01d ___scrt_fastfail 95154->95155 95156 7fb058 95155->95156 95157 7fb094 95155->95157 95253 77b567 95156->95253 95160 77b567 39 API calls 95157->95160 95162 7fb08b 95157->95162 95159 7fb0ed 95163 777510 53 API calls 95159->95163 95164 7fb0a5 95160->95164 95161 7fb063 95161->95162 95165 77b567 39 API calls 95161->95165 95162->95159 95166 77b567 39 API calls 95162->95166 95167 7fb10b 95163->95167 95168 77b567 39 API calls 95164->95168 95169 7fb078 95165->95169 95166->95159 95246 777620 95167->95246 95168->95162 95171 77b567 39 API calls 95169->95171 95171->95162 95172 7fb115 95173 7fb11f 95172->95173 95174 7fb1d8 95172->95174 95176 777510 53 API calls 95173->95176 95175 7fb20a GetCurrentDirectoryW 95174->95175 95177 777510 53 API calls 95174->95177 95178 78fe0b 22 API calls 95175->95178 95179 7fb130 95176->95179 95180 7fb1ef 95177->95180 95181 7fb22f GetCurrentDirectoryW 95178->95181 95182 777620 22 API calls 95179->95182 95183 777620 22 API calls 95180->95183 95184 7fb23c 95181->95184 95185 7fb13a 95182->95185 95187 7fb1f9 _wcslen 95183->95187 95188 7fb275 95184->95188 95258 779c6e 22 API calls 95184->95258 95186 777510 53 API calls 95185->95186 95189 7fb14b 95186->95189 95187->95175 95187->95188 95196 7fb28b 95188->95196 95197 7fb287 95188->95197 95191 777620 22 API calls 95189->95191 95193 7fb155 95191->95193 95192 7fb255 95259 779c6e 22 API calls 95192->95259 95195 777510 53 API calls 95193->95195 95199 7fb166 95195->95199 95261 7e07c0 10 API calls 95196->95261 95201 7fb39a CreateProcessW 95197->95201 95202 7fb2f8 95197->95202 95198 7fb265 95260 779c6e 22 API calls 95198->95260 95204 777620 22 API calls 95199->95204 95244 7fb32f _wcslen 95201->95244 95264 7d11c8 39 API calls 95202->95264 95207 7fb170 95204->95207 95205 7fb294 95262 7e06e6 10 API calls 95205->95262 95210 7fb1a6 GetSystemDirectoryW 95207->95210 95216 777510 53 API calls 95207->95216 95209 7fb2fd 95214 7fb32a 95209->95214 95215 7fb323 95209->95215 95213 78fe0b 22 API calls 95210->95213 95211 7fb2aa 95263 7e05a7 8 API calls 95211->95263 95218 7fb1cb GetSystemDirectoryW 95213->95218 95266 7d14ce 6 API calls 95214->95266 95265 7d1201 128 API calls 2 library calls 95215->95265 95220 7fb187 95216->95220 95217 7fb2d0 95217->95197 95218->95184 95223 777620 22 API calls 95220->95223 95222 7fb328 95222->95244 95226 7fb191 _wcslen 95223->95226 95224 7fb42f CloseHandle 95227 7fb43f 95224->95227 95237 7fb49a 95224->95237 95225 7fb3d6 GetLastError 95236 7fb41a 95225->95236 95226->95184 95226->95210 95228 7fb446 CloseHandle 95227->95228 95229 7fb451 95227->95229 95228->95229 95231 7fb458 CloseHandle 95229->95231 95232 7fb463 95229->95232 95231->95232 95234 7fb46a CloseHandle 95232->95234 95235 7fb475 95232->95235 95233 7fb4a6 95233->95236 95234->95235 95267 7e09d9 34 API calls 95235->95267 95250 7e0175 95236->95250 95237->95233 95240 7fb4d2 CloseHandle 95237->95240 95240->95236 95242 7fb486 95268 7fb536 25 API calls 95242->95268 95244->95224 95244->95225 95245->95001 95247 77762a _wcslen 95246->95247 95248 78fe0b 22 API calls 95247->95248 95249 77763f 95248->95249 95249->95172 95269 7e030f 95250->95269 95254 77b578 95253->95254 95255 77b57f 95253->95255 95254->95255 95282 7962d1 39 API calls 95254->95282 95255->95161 95257 77b5c2 95257->95161 95258->95192 95259->95198 95260->95188 95261->95205 95262->95211 95263->95217 95264->95209 95265->95222 95266->95244 95267->95242 95268->95237 95270 7e0329 95269->95270 95271 7e0321 CloseHandle 95269->95271 95272 7e032e CloseHandle 95270->95272 95273 7e0336 95270->95273 95271->95270 95272->95273 95274 7e033b CloseHandle 95273->95274 95275 7e0343 95273->95275 95274->95275 95276 7e0348 CloseHandle 95275->95276 95277 7e0350 95275->95277 95276->95277 95278 7e035d 95277->95278 95279 7e0355 CloseHandle 95277->95279 95280 7e017d 95278->95280 95281 7e0362 CloseHandle 95278->95281 95279->95278 95280->95002 95281->95280 95282->95257 95283->95032 95284->95032 95285->95031 95286->95031 95287->95031 95288->95031 95289->95036 95290->95031 95291 7c3f75 95302 78ceb1 95291->95302 95293 7c3f8b 95294 7c4006 95293->95294 95369 78e300 23 API calls 95293->95369 95311 77bf40 95294->95311 95298 7c3fe6 95300 7c4052 95298->95300 95370 7e1abf 22 API calls 95298->95370 95299 7c4a88 95300->95299 95371 7e359c 82 API calls __wsopen_s 95300->95371 95303 78cebf 95302->95303 95304 78ced2 95302->95304 95372 77aceb 23 API calls messages 95303->95372 95306 78cf05 95304->95306 95307 78ced7 95304->95307 95373 77aceb 23 API calls messages 95306->95373 95308 78fddb 22 API calls 95307->95308 95310 78cec9 95308->95310 95310->95293 95374 77adf0 95311->95374 95313 77bf9d 95314 7c04b6 95313->95314 95315 77bfa9 95313->95315 95393 7e359c 82 API calls __wsopen_s 95314->95393 95317 7c04c6 95315->95317 95318 77c01e 95315->95318 95394 7e359c 82 API calls __wsopen_s 95317->95394 95379 77ac91 95318->95379 95321 77c7da 95325 78fe0b 22 API calls 95321->95325 95330 77c808 __fread_nolock 95325->95330 95327 7c04f5 95331 7c055a 95327->95331 95395 78d217 348 API calls 95327->95395 95336 78fe0b 22 API calls 95330->95336 95351 77c603 95331->95351 95396 7e359c 82 API calls __wsopen_s 95331->95396 95332 77ec40 348 API calls 95339 77c039 __fread_nolock messages 95332->95339 95333 77af8a 22 API calls 95333->95339 95334 7d7120 22 API calls 95334->95339 95335 7c091a 95406 7e3209 23 API calls 95335->95406 95341 77c350 __fread_nolock messages 95336->95341 95339->95321 95339->95327 95339->95330 95339->95331 95339->95332 95339->95333 95339->95334 95339->95335 95340 77c237 95339->95340 95342 7c08a5 95339->95342 95346 7c0591 95339->95346 95349 7c08f6 95339->95349 95339->95351 95353 78fddb 22 API calls 95339->95353 95357 78fe0b 22 API calls 95339->95357 95363 7c09bf 95339->95363 95365 77bbe0 40 API calls 95339->95365 95383 77ad81 95339->95383 95398 7d7099 22 API calls __fread_nolock 95339->95398 95399 7f5745 54 API calls _wcslen 95339->95399 95400 78aa42 22 API calls messages 95339->95400 95401 7df05c 40 API calls 95339->95401 95402 77a993 41 API calls 95339->95402 95403 77aceb 23 API calls messages 95339->95403 95355 77c253 95340->95355 95407 77a8c7 22 API calls __fread_nolock 95340->95407 95368 77c3ac 95341->95368 95392 78ce17 22 API calls messages 95341->95392 95343 77ec40 348 API calls 95342->95343 95345 7c08cf 95343->95345 95345->95351 95404 77a81b 41 API calls 95345->95404 95397 7e359c 82 API calls __wsopen_s 95346->95397 95405 7e359c 82 API calls __wsopen_s 95349->95405 95351->95300 95353->95339 95358 7c0976 95355->95358 95361 77c297 messages 95355->95361 95357->95339 95408 77aceb 23 API calls messages 95358->95408 95361->95363 95390 77aceb 23 API calls messages 95361->95390 95363->95351 95409 7e359c 82 API calls __wsopen_s 95363->95409 95364 77c335 95364->95363 95366 77c342 95364->95366 95365->95339 95391 77a704 22 API calls messages 95366->95391 95368->95300 95369->95298 95370->95294 95371->95299 95372->95310 95373->95310 95375 77ae01 95374->95375 95378 77ae1c messages 95374->95378 95376 77aec9 22 API calls 95375->95376 95377 77ae09 CharUpperBuffW 95376->95377 95377->95378 95378->95313 95380 77acae 95379->95380 95381 77acd1 95380->95381 95410 7e359c 82 API calls __wsopen_s 95380->95410 95381->95339 95384 7bfadb 95383->95384 95385 77ad92 95383->95385 95386 78fddb 22 API calls 95385->95386 95387 77ad99 95386->95387 95411 77adcd 95387->95411 95390->95364 95391->95341 95392->95341 95393->95317 95394->95351 95395->95331 95396->95351 95397->95351 95398->95339 95399->95339 95400->95339 95401->95339 95402->95339 95403->95339 95404->95349 95405->95351 95406->95340 95407->95355 95408->95363 95409->95351 95410->95381 95417 77addd 95411->95417 95412 77adb6 95412->95339 95413 78fddb 22 API calls 95413->95417 95414 77a961 22 API calls 95414->95417 95416 77adcd 22 API calls 95416->95417 95417->95412 95417->95413 95417->95414 95417->95416 95418 77a8c7 22 API calls __fread_nolock 95417->95418 95418->95417 95419 77dddc 95422 77b710 95419->95422 95423 77b72b 95422->95423 95424 7c00f8 95423->95424 95425 7c0146 95423->95425 95451 77b750 95423->95451 95428 7c010f 95424->95428 95429 7c0102 95424->95429 95424->95451 95464 7f58a2 348 API calls 2 library calls 95425->95464 95448 77ba20 95428->95448 95463 7f61d0 348 API calls 2 library calls 95428->95463 95462 7f5d33 348 API calls 95429->95462 95434 7c03d9 95434->95434 95435 78d336 40 API calls 95435->95451 95437 77bbe0 40 API calls 95437->95451 95440 77ba4e 95441 7c0322 95468 7f5c0c 82 API calls 95441->95468 95448->95440 95469 7e359c 82 API calls __wsopen_s 95448->95469 95449 77ec40 348 API calls 95449->95451 95451->95435 95451->95437 95451->95440 95451->95441 95451->95448 95451->95449 95453 77a81b 41 API calls 95451->95453 95454 78d2f0 40 API calls 95451->95454 95455 78a01b 348 API calls 95451->95455 95456 790242 5 API calls __Init_thread_wait 95451->95456 95457 78edcd 22 API calls 95451->95457 95458 7900a3 29 API calls __onexit 95451->95458 95459 7901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95451->95459 95460 78ee53 82 API calls 95451->95460 95461 78e5ca 348 API calls 95451->95461 95465 77aceb 23 API calls messages 95451->95465 95466 7cf6bf 23 API calls 95451->95466 95467 77a8c7 22 API calls __fread_nolock 95451->95467 95453->95451 95454->95451 95455->95451 95456->95451 95457->95451 95458->95451 95459->95451 95460->95451 95461->95451 95462->95428 95463->95448 95464->95451 95465->95451 95466->95451 95467->95451 95468->95448 95469->95434 95470 77105b 95475 77344d 95470->95475 95472 77106a 95506 7900a3 29 API calls __onexit 95472->95506 95474 771074 95476 77345d __wsopen_s 95475->95476 95477 77a961 22 API calls 95476->95477 95478 773513 95477->95478 95479 773a5a 24 API calls 95478->95479 95480 77351c 95479->95480 95507 773357 95480->95507 95483 7733c6 22 API calls 95484 773535 95483->95484 95485 77515f 22 API calls 95484->95485 95486 773544 95485->95486 95487 77a961 22 API calls 95486->95487 95488 77354d 95487->95488 95489 77a6c3 22 API calls 95488->95489 95490 773556 RegOpenKeyExW 95489->95490 95491 7b3176 RegQueryValueExW 95490->95491 95495 773578 95490->95495 95492 7b320c RegCloseKey 95491->95492 95493 7b3193 95491->95493 95492->95495 95499 7b321e _wcslen 95492->95499 95494 78fe0b 22 API calls 95493->95494 95496 7b31ac 95494->95496 95495->95472 95498 775722 22 API calls 95496->95498 95497 774c6d 22 API calls 95497->95499 95500 7b31b7 RegQueryValueExW 95498->95500 95499->95495 95499->95497 95504 779cb3 22 API calls 95499->95504 95505 77515f 22 API calls 95499->95505 95501 7b31ee messages 95500->95501 95502 7b31d4 95500->95502 95501->95492 95503 776b57 22 API calls 95502->95503 95503->95501 95504->95499 95505->95499 95506->95474 95508 7b1f50 __wsopen_s 95507->95508 95509 773364 GetFullPathNameW 95508->95509 95510 773386 95509->95510 95511 776b57 22 API calls 95510->95511 95512 7733a4 95511->95512 95512->95483 95513 771098 95518 7742de 95513->95518 95517 7710a7 95519 77a961 22 API calls 95518->95519 95520 7742f5 GetVersionExW 95519->95520 95521 776b57 22 API calls 95520->95521 95522 774342 95521->95522 95523 7793b2 22 API calls 95522->95523 95525 774378 95522->95525 95524 77436c 95523->95524 95527 7737a0 22 API calls 95524->95527 95526 77441b GetCurrentProcess IsWow64Process 95525->95526 95533 7b37df 95525->95533 95528 774437 95526->95528 95527->95525 95529 77444f LoadLibraryA 95528->95529 95530 7b3824 GetSystemInfo 95528->95530 95531 774460 GetProcAddress 95529->95531 95532 77449c GetSystemInfo 95529->95532 95531->95532 95534 774470 GetNativeSystemInfo 95531->95534 95535 774476 95532->95535 95534->95535 95536 77109d 95535->95536 95537 77447a FreeLibrary 95535->95537 95538 7900a3 29 API calls __onexit 95536->95538 95537->95536 95538->95517 95539 771044 95544 7710f3 95539->95544 95541 77104a 95580 7900a3 29 API calls __onexit 95541->95580 95543 771054 95581 771398 95544->95581 95548 77116a 95549 77a961 22 API calls 95548->95549 95550 771174 95549->95550 95551 77a961 22 API calls 95550->95551 95552 77117e 95551->95552 95553 77a961 22 API calls 95552->95553 95554 771188 95553->95554 95555 77a961 22 API calls 95554->95555 95556 7711c6 95555->95556 95557 77a961 22 API calls 95556->95557 95558 771292 95557->95558 95591 77171c 95558->95591 95562 7712c4 95563 77a961 22 API calls 95562->95563 95564 7712ce 95563->95564 95565 781940 9 API calls 95564->95565 95566 7712f9 95565->95566 95612 771aab 95566->95612 95568 771315 95569 771325 GetStdHandle 95568->95569 95570 77137a 95569->95570 95571 7b2485 95569->95571 95574 771387 OleInitialize 95570->95574 95571->95570 95572 7b248e 95571->95572 95573 78fddb 22 API calls 95572->95573 95575 7b2495 95573->95575 95574->95541 95619 7e011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 95575->95619 95577 7b249e 95620 7e0944 CreateThread 95577->95620 95579 7b24aa CloseHandle 95579->95570 95580->95543 95621 7713f1 95581->95621 95584 7713f1 22 API calls 95585 7713d0 95584->95585 95586 77a961 22 API calls 95585->95586 95587 7713dc 95586->95587 95588 776b57 22 API calls 95587->95588 95589 771129 95588->95589 95590 771bc3 6 API calls 95589->95590 95590->95548 95592 77a961 22 API calls 95591->95592 95593 77172c 95592->95593 95594 77a961 22 API calls 95593->95594 95595 771734 95594->95595 95596 77a961 22 API calls 95595->95596 95597 77174f 95596->95597 95598 78fddb 22 API calls 95597->95598 95599 77129c 95598->95599 95600 771b4a 95599->95600 95601 771b58 95600->95601 95602 77a961 22 API calls 95601->95602 95603 771b63 95602->95603 95604 77a961 22 API calls 95603->95604 95605 771b6e 95604->95605 95606 77a961 22 API calls 95605->95606 95607 771b79 95606->95607 95608 77a961 22 API calls 95607->95608 95609 771b84 95608->95609 95610 78fddb 22 API calls 95609->95610 95611 771b96 RegisterWindowMessageW 95610->95611 95611->95562 95613 7b272d 95612->95613 95614 771abb 95612->95614 95628 7e3209 23 API calls 95613->95628 95615 78fddb 22 API calls 95614->95615 95618 771ac3 95615->95618 95617 7b2738 95618->95568 95619->95577 95620->95579 95629 7e092a 28 API calls 95620->95629 95622 77a961 22 API calls 95621->95622 95623 7713fc 95622->95623 95624 77a961 22 API calls 95623->95624 95625 771404 95624->95625 95626 77a961 22 API calls 95625->95626 95627 7713c6 95626->95627 95627->95584 95628->95617 95630 772de3 95631 772df0 __wsopen_s 95630->95631 95632 772e09 95631->95632 95634 7b2c2b ___scrt_fastfail 95631->95634 95633 773aa2 23 API calls 95632->95633 95635 772e12 95633->95635 95636 7b2c47 GetOpenFileNameW 95634->95636 95646 772da5 95635->95646 95637 7b2c96 95636->95637 95639 776b57 22 API calls 95637->95639 95641 7b2cab 95639->95641 95641->95641 95643 772e27 95664 7744a8 95643->95664 95647 7b1f50 __wsopen_s 95646->95647 95648 772db2 GetLongPathNameW 95647->95648 95649 776b57 22 API calls 95648->95649 95650 772dda 95649->95650 95651 773598 95650->95651 95652 77a961 22 API calls 95651->95652 95653 7735aa 95652->95653 95654 773aa2 23 API calls 95653->95654 95655 7735b5 95654->95655 95656 7b32eb 95655->95656 95657 7735c0 95655->95657 95661 7b330d 95656->95661 95699 78ce60 41 API calls 95656->95699 95659 77515f 22 API calls 95657->95659 95660 7735cc 95659->95660 95693 7735f3 95660->95693 95663 7735df 95663->95643 95665 774ecb 94 API calls 95664->95665 95666 7744cd 95665->95666 95667 7b3833 95666->95667 95669 774ecb 94 API calls 95666->95669 95668 7e2cf9 80 API calls 95667->95668 95671 7b3848 95668->95671 95670 7744e1 95669->95670 95670->95667 95672 7744e9 95670->95672 95673 7b3869 95671->95673 95674 7b384c 95671->95674 95675 7744f5 95672->95675 95676 7b3854 95672->95676 95678 78fe0b 22 API calls 95673->95678 95677 774f39 68 API calls 95674->95677 95700 77940c 136 API calls 2 library calls 95675->95700 95701 7dda5a 82 API calls 95676->95701 95677->95676 95690 7b38ae 95678->95690 95681 772e31 95682 7b3862 95682->95673 95683 774f39 68 API calls 95686 7b3a5f 95683->95686 95686->95683 95707 7d989b 82 API calls __wsopen_s 95686->95707 95689 779cb3 22 API calls 95689->95690 95690->95686 95690->95689 95702 7d967e 22 API calls __fread_nolock 95690->95702 95703 7d95ad 42 API calls _wcslen 95690->95703 95704 7e0b5a 22 API calls 95690->95704 95705 77a4a1 22 API calls __fread_nolock 95690->95705 95706 773ff7 22 API calls 95690->95706 95694 773605 95693->95694 95698 773624 __fread_nolock 95693->95698 95696 78fe0b 22 API calls 95694->95696 95695 78fddb 22 API calls 95697 77363b 95695->95697 95696->95698 95697->95663 95698->95695 95699->95656 95700->95681 95701->95682 95702->95690 95703->95690 95704->95690 95705->95690 95706->95690 95707->95686 95708 7a8402 95713 7a81be 95708->95713 95711 7a842a 95714 7a81ef try_get_first_available_module 95713->95714 95721 7a8338 95714->95721 95728 798e0b 40 API calls 2 library calls 95714->95728 95716 7a83ee 95732 7a27ec 26 API calls _strftime 95716->95732 95718 7a8343 95718->95711 95725 7b0984 95718->95725 95720 7a838c 95720->95721 95729 798e0b 40 API calls 2 library calls 95720->95729 95721->95718 95731 79f2d9 20 API calls __dosmaperr 95721->95731 95723 7a83ab 95723->95721 95730 798e0b 40 API calls 2 library calls 95723->95730 95733 7b0081 95725->95733 95727 7b099f 95727->95711 95728->95720 95729->95723 95730->95721 95731->95716 95732->95718 95736 7b008d ___scrt_is_nonwritable_in_current_image 95733->95736 95734 7b009b 95790 79f2d9 20 API calls __dosmaperr 95734->95790 95736->95734 95738 7b00d4 95736->95738 95737 7b00a0 95791 7a27ec 26 API calls _strftime 95737->95791 95744 7b065b 95738->95744 95743 7b00aa __fread_nolock 95743->95727 95745 7b0678 95744->95745 95746 7b068d 95745->95746 95747 7b06a6 95745->95747 95807 79f2c6 20 API calls __dosmaperr 95746->95807 95793 7a5221 95747->95793 95750 7b06ab 95751 7b06cb 95750->95751 95752 7b06b4 95750->95752 95806 7b039a CreateFileW 95751->95806 95809 79f2c6 20 API calls __dosmaperr 95752->95809 95756 7b06b9 95810 79f2d9 20 API calls __dosmaperr 95756->95810 95757 7b0781 GetFileType 95763 7b078c GetLastError 95757->95763 95764 7b07d3 95757->95764 95758 7b0704 95758->95757 95762 7b0756 GetLastError 95758->95762 95811 7b039a CreateFileW 95758->95811 95759 7b00f8 95792 7b0121 LeaveCriticalSection __wsopen_s 95759->95792 95761 7b0692 95808 79f2d9 20 API calls __dosmaperr 95761->95808 95812 79f2a3 20 API calls __dosmaperr 95762->95812 95813 79f2a3 20 API calls __dosmaperr 95763->95813 95815 7a516a 21 API calls 2 library calls 95764->95815 95768 7b079a CloseHandle 95768->95761 95769 7b07c3 95768->95769 95814 79f2d9 20 API calls __dosmaperr 95769->95814 95771 7b0749 95771->95757 95771->95762 95773 7b07f4 95775 7b0840 95773->95775 95816 7b05ab 72 API calls 3 library calls 95773->95816 95774 7b07c8 95774->95761 95780 7b086d 95775->95780 95817 7b014d 72 API calls 4 library calls 95775->95817 95778 7b0866 95779 7b087e 95778->95779 95778->95780 95779->95759 95782 7b08fc CloseHandle 95779->95782 95781 7a86ae __wsopen_s 29 API calls 95780->95781 95781->95759 95818 7b039a CreateFileW 95782->95818 95784 7b0927 95785 7b095d 95784->95785 95786 7b0931 GetLastError 95784->95786 95785->95759 95819 79f2a3 20 API calls __dosmaperr 95786->95819 95788 7b093d 95820 7a5333 21 API calls 2 library calls 95788->95820 95790->95737 95791->95743 95792->95743 95794 7a522d ___scrt_is_nonwritable_in_current_image 95793->95794 95821 7a2f5e EnterCriticalSection 95794->95821 95796 7a527b 95822 7a532a 95796->95822 95797 7a5259 95800 7a5000 __wsopen_s 21 API calls 95797->95800 95798 7a5234 95798->95796 95798->95797 95803 7a52c7 EnterCriticalSection 95798->95803 95802 7a525e 95800->95802 95801 7a52a4 __fread_nolock 95801->95750 95802->95796 95825 7a5147 EnterCriticalSection 95802->95825 95803->95796 95804 7a52d4 LeaveCriticalSection 95803->95804 95804->95798 95806->95758 95807->95761 95808->95759 95809->95756 95810->95761 95811->95771 95812->95761 95813->95768 95814->95774 95815->95773 95816->95775 95817->95778 95818->95784 95819->95788 95820->95785 95821->95798 95826 7a2fa6 LeaveCriticalSection 95822->95826 95824 7a5331 95824->95801 95825->95796 95826->95824 95827 7b2402 95830 771410 95827->95830 95831 7b24b8 DestroyWindow 95830->95831 95832 77144f mciSendStringW 95830->95832 95844 7b24c4 95831->95844 95833 7716c6 95832->95833 95834 77146b 95832->95834 95833->95834 95836 7716d5 UnregisterHotKey 95833->95836 95835 771479 95834->95835 95834->95844 95863 77182e 95835->95863 95836->95833 95838 7b24d8 95838->95844 95869 776246 CloseHandle 95838->95869 95839 7b24e2 FindClose 95839->95844 95841 7b2509 95845 7b252d 95841->95845 95846 7b251c FreeLibrary 95841->95846 95843 77148e 95843->95845 95853 77149c 95843->95853 95844->95838 95844->95839 95844->95841 95847 7b2541 VirtualFree 95845->95847 95854 771509 95845->95854 95846->95841 95847->95845 95848 7714f8 CoUninitialize 95848->95854 95849 7b2589 95856 7b2598 messages 95849->95856 95870 7e32eb 6 API calls messages 95849->95870 95850 771514 95851 771524 95850->95851 95867 771944 VirtualFreeEx CloseHandle 95851->95867 95853->95848 95854->95849 95854->95850 95859 7b2627 95856->95859 95871 7d64d4 22 API calls messages 95856->95871 95858 77153a 95858->95856 95860 77161f 95858->95860 95859->95859 95860->95859 95868 771876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 95860->95868 95862 7716c1 95864 77183b 95863->95864 95865 771480 95864->95865 95872 7d702a 22 API calls 95864->95872 95865->95841 95865->95843 95867->95858 95868->95862 95869->95838 95870->95849 95871->95856 95872->95864 95873 771cad SystemParametersInfoW 95874 7c2a00 95890 77d7b0 messages 95874->95890 95875 77db11 PeekMessageW 95875->95890 95876 77d807 GetInputState 95876->95875 95876->95890 95878 7c1cbe TranslateAcceleratorW 95878->95890 95879 77db8f PeekMessageW 95879->95890 95880 77da04 timeGetTime 95880->95890 95881 77db73 TranslateMessage DispatchMessageW 95881->95879 95882 77dbaf Sleep 95882->95890 95883 7c2b74 Sleep 95892 7c2a51 95883->95892 95886 7c1dda timeGetTime 95920 78e300 23 API calls 95886->95920 95889 7c2c0b GetExitCodeProcess 95894 7c2c37 CloseHandle 95889->95894 95895 7c2c21 WaitForSingleObject 95889->95895 95890->95875 95890->95876 95890->95878 95890->95879 95890->95880 95890->95881 95890->95882 95890->95883 95890->95886 95890->95892 95896 77d9d5 95890->95896 95901 77ec40 348 API calls 95890->95901 95903 781310 348 API calls 95890->95903 95904 77bf40 348 API calls 95890->95904 95906 77dd50 95890->95906 95913 78edf6 95890->95913 95918 77dfd0 348 API calls 3 library calls 95890->95918 95919 78e551 timeGetTime 95890->95919 95921 7e3a2a 23 API calls 95890->95921 95922 7e359c 82 API calls __wsopen_s 95890->95922 95891 8029bf GetForegroundWindow 95891->95892 95892->95889 95892->95890 95892->95891 95892->95896 95897 7c2ca9 Sleep 95892->95897 95923 7f5658 23 API calls 95892->95923 95924 7de97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95892->95924 95925 78e551 timeGetTime 95892->95925 95926 7dd4dc 47 API calls 95892->95926 95894->95892 95895->95890 95895->95894 95897->95890 95901->95890 95903->95890 95904->95890 95907 77dd83 95906->95907 95908 77dd6f 95906->95908 95959 7e359c 82 API calls __wsopen_s 95907->95959 95927 77d260 95908->95927 95910 77dd7a 95910->95890 95912 7c2f75 95912->95912 95914 78ee09 95913->95914 95915 78ee12 95913->95915 95914->95890 95915->95914 95916 78ee36 IsDialogMessageW 95915->95916 95917 7cefaf GetClassLongW 95915->95917 95916->95914 95916->95915 95917->95915 95917->95916 95918->95890 95919->95890 95920->95890 95921->95890 95922->95890 95923->95892 95924->95892 95925->95892 95926->95892 95928 77ec40 348 API calls 95927->95928 95945 77d29d 95928->95945 95929 7c1bc4 95966 7e359c 82 API calls __wsopen_s 95929->95966 95931 77d6d5 95933 77d30b messages 95931->95933 95943 78fe0b 22 API calls 95931->95943 95932 77d3c3 95932->95931 95935 77d3ce 95932->95935 95933->95910 95934 77d5ff 95936 77d614 95934->95936 95937 7c1bb5 95934->95937 95939 78fddb 22 API calls 95935->95939 95940 78fddb 22 API calls 95936->95940 95965 7f5705 23 API calls 95937->95965 95938 77d4b8 95944 78fe0b 22 API calls 95938->95944 95948 77d3d5 __fread_nolock 95939->95948 95951 77d46a 95940->95951 95942 78fddb 22 API calls 95942->95945 95943->95948 95952 77d429 __fread_nolock messages 95944->95952 95945->95929 95945->95931 95945->95932 95945->95933 95945->95938 95945->95942 95945->95952 95946 78fddb 22 API calls 95947 77d3f6 95946->95947 95947->95952 95960 77bec0 348 API calls 95947->95960 95948->95946 95948->95947 95950 7c1ba4 95964 7e359c 82 API calls __wsopen_s 95950->95964 95951->95910 95952->95934 95952->95950 95952->95951 95955 7c1b7f 95952->95955 95957 7c1b5d 95952->95957 95961 771f6f 348 API calls 95952->95961 95963 7e359c 82 API calls __wsopen_s 95955->95963 95962 7e359c 82 API calls __wsopen_s 95957->95962 95959->95912 95960->95952 95961->95952 95962->95951 95963->95951 95964->95951 95965->95929 95966->95933 95967 7b2ba5 95968 772b25 95967->95968 95969 7b2baf 95967->95969 95995 772b83 7 API calls 95968->95995 95971 773a5a 24 API calls 95969->95971 95972 7b2bb8 95971->95972 95974 779cb3 22 API calls 95972->95974 95977 7b2bc6 95974->95977 95976 772b2f 95982 773837 49 API calls 95976->95982 95984 772b44 95976->95984 95978 7b2bce 95977->95978 95979 7b2bf5 95977->95979 95980 7733c6 22 API calls 95978->95980 95981 7733c6 22 API calls 95979->95981 95983 7b2bd9 95980->95983 95994 7b2bf1 GetForegroundWindow ShellExecuteW 95981->95994 95982->95984 95985 776350 22 API calls 95983->95985 95987 7730f2 Shell_NotifyIconW 95984->95987 95988 772b5f 95984->95988 95989 7b2be7 95985->95989 95987->95988 95991 772b66 SetCurrentDirectoryW 95988->95991 95992 7733c6 22 API calls 95989->95992 95990 7b2c26 95990->95988 95993 772b7a 95991->95993 95992->95994 95994->95990 95999 772cd4 7 API calls 95995->95999 95997 772b2a 95998 772c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 95997->95998 95998->95976 95999->95997

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 400 7742de-77434d call 77a961 GetVersionExW call 776b57 405 774353 400->405 406 7b3617-7b362a 400->406 407 774355-774357 405->407 408 7b362b-7b362f 406->408 409 77435d-7743bc call 7793b2 call 7737a0 407->409 410 7b3656 407->410 411 7b3632-7b363e 408->411 412 7b3631 408->412 429 7b37df-7b37e6 409->429 430 7743c2-7743c4 409->430 416 7b365d-7b3660 410->416 411->408 414 7b3640-7b3642 411->414 412->411 414->407 415 7b3648-7b364f 414->415 415->406 418 7b3651 415->418 419 77441b-774435 GetCurrentProcess IsWow64Process 416->419 420 7b3666-7b36a8 416->420 418->410 422 774437 419->422 423 774494-77449a 419->423 420->419 424 7b36ae-7b36b1 420->424 426 77443d-774449 422->426 423->426 427 7b36db-7b36e5 424->427 428 7b36b3-7b36bd 424->428 431 77444f-77445e LoadLibraryA 426->431 432 7b3824-7b3828 GetSystemInfo 426->432 436 7b36f8-7b3702 427->436 437 7b36e7-7b36f3 427->437 433 7b36ca-7b36d6 428->433 434 7b36bf-7b36c5 428->434 438 7b37e8 429->438 439 7b3806-7b3809 429->439 430->416 435 7743ca-7743dd 430->435 442 774460-77446e GetProcAddress 431->442 443 77449c-7744a6 GetSystemInfo 431->443 433->419 434->419 444 7743e3-7743e5 435->444 445 7b3726-7b372f 435->445 447 7b3715-7b3721 436->447 448 7b3704-7b3710 436->448 437->419 446 7b37ee 438->446 440 7b380b-7b381a 439->440 441 7b37f4-7b37fc 439->441 440->446 451 7b381c-7b3822 440->451 441->439 442->443 452 774470-774474 GetNativeSystemInfo 442->452 453 774476-774478 443->453 454 7b374d-7b3762 444->454 455 7743eb-7743ee 444->455 449 7b373c-7b3748 445->449 450 7b3731-7b3737 445->450 446->441 447->419 448->419 449->419 450->419 451->441 452->453 458 774481-774493 453->458 459 77447a-77447b FreeLibrary 453->459 456 7b376f-7b377b 454->456 457 7b3764-7b376a 454->457 460 7743f4-77440f 455->460 461 7b3791-7b3794 455->461 456->419 457->419 459->458 463 774415 460->463 464 7b3780-7b378c 460->464 461->419 462 7b379a-7b37c1 461->462 465 7b37ce-7b37da 462->465 466 7b37c3-7b37c9 462->466 463->419 464->419 465->419 466->419
                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 0077430D
                                                            • Part of subcall function 00776B57: _wcslen.LIBCMT ref: 00776B6A
                                                          • GetCurrentProcess.KERNEL32(?,0080CB64,00000000,?,?), ref: 00774422
                                                          • IsWow64Process.KERNEL32(00000000,?,?), ref: 00774429
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00774454
                                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00774466
                                                          • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00774474
                                                          • FreeLibrary.KERNEL32(00000000,?,?), ref: 0077447B
                                                          • GetSystemInfo.KERNEL32(?,?,?), ref: 007744A0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                          • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                          • API String ID: 3290436268-3101561225
                                                          • Opcode ID: 1887a12ac4ddadad8a7ed9425090215913af7e49a0a1382f5696d7be5ab5232d
                                                          • Instruction ID: 9f07e03b1ba09a5ec632ca88a28043f760c66f3acb5feacc3cfd9e4bef341ef9
                                                          • Opcode Fuzzy Hash: 1887a12ac4ddadad8a7ed9425090215913af7e49a0a1382f5696d7be5ab5232d
                                                          • Instruction Fuzzy Hash: 04A1847A90A3C0DFCF11CF697C896E67FA47B27784B148899D04593B62E72C49C8DB21

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 804 7742a2-7742ba CreateStreamOnHGlobal 805 7742bc-7742d3 FindResourceExW 804->805 806 7742da-7742dd 804->806 807 7b35ba-7b35c9 LoadResource 805->807 808 7742d9 805->808 807->808 809 7b35cf-7b35dd SizeofResource 807->809 808->806 809->808 810 7b35e3-7b35ee LockResource 809->810 810->808 811 7b35f4-7b3612 810->811 811->808
                                                          APIs
                                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,007750AA,?,?,00000000,00000000), ref: 007742B2
                                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,007750AA,?,?,00000000,00000000), ref: 007742C9
                                                          • LoadResource.KERNEL32(?,00000000,?,?,007750AA,?,?,00000000,00000000,?,?,?,?,?,?,00774F20), ref: 007B35BE
                                                          • SizeofResource.KERNEL32(?,00000000,?,?,007750AA,?,?,00000000,00000000,?,?,?,?,?,?,00774F20), ref: 007B35D3
                                                          • LockResource.KERNEL32(007750AA,?,?,007750AA,?,?,00000000,00000000,?,?,?,?,?,?,00774F20,?), ref: 007B35E6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                          • String ID: SCRIPT
                                                          • API String ID: 3051347437-3967369404
                                                          • Opcode ID: 07c45ef8f61494a9921150b5ab97edee8f3694767d1c5930dda575ffc8862e81
                                                          • Instruction ID: 9f6fe591aef3a46c9db4bee463a26226469bb5ac6838789473ebfc7ea4b0a274
                                                          • Opcode Fuzzy Hash: 07c45ef8f61494a9921150b5ab97edee8f3694767d1c5930dda575ffc8862e81
                                                          • Instruction Fuzzy Hash: C1117C71200700BFDB218F65DC49F677BB9FBC5B91F208269B416D66A0DB71D8208A20

                                                          Control-flow Graph

                                                          APIs
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00772B6B
                                                            • Part of subcall function 00773A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00841418,?,00772E7F,?,?,?,00000000), ref: 00773A78
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                          • GetForegroundWindow.USER32(runas,?,?,?,?,?,00832224), ref: 007B2C10
                                                          • ShellExecuteW.SHELL32(00000000,?,?,00832224), ref: 007B2C17
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                          • String ID: runas
                                                          • API String ID: 448630720-4000483414
                                                          • Opcode ID: 309e64852b438930237960319626d416c6aed69d62283c4d2e3ba5867aba6f0e
                                                          • Instruction ID: f46aad7207e9747fc360d09b28e653423224a417e2f25551fa28d11a48c9afac
                                                          • Opcode Fuzzy Hash: 309e64852b438930237960319626d416c6aed69d62283c4d2e3ba5867aba6f0e
                                                          • Instruction Fuzzy Hash: E711E771204305DACF14FF60D85A9AEBBA5BB91780F04842DF15E520A3DF3C894AD752

                                                          Control-flow Graph

                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 007FA6AC
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 007FA6BA
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 007FA79C
                                                          • CloseHandle.KERNELBASE(00000000), ref: 007FA7AB
                                                            • Part of subcall function 0078CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,007B3303,?), ref: 0078CE8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                          • String ID:
                                                          • API String ID: 1991900642-0
                                                          • Opcode ID: 79161dcc95b77b78124db8aed9deedf3c5c297af90b6a973cba789bdbc82edf7
                                                          • Instruction ID: 8c54a0308c278c35504b34f363b4c09c0e587579b42ec74e078418c619d0ef02
                                                          • Opcode Fuzzy Hash: 79161dcc95b77b78124db8aed9deedf3c5c297af90b6a973cba789bdbc82edf7
                                                          • Instruction Fuzzy Hash: C351FC71508300EFD710EF24C886A6BBBE8FF89754F40892DF59997252EB74D905CB92

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1030 7ddbbe-7ddbda lstrlenW 1031 7ddbdc-7ddbe6 GetFileAttributesW 1030->1031 1032 7ddc06 1030->1032 1033 7ddc09-7ddc0d 1031->1033 1034 7ddbe8-7ddbf7 FindFirstFileW 1031->1034 1032->1033 1034->1032 1035 7ddbf9-7ddc04 FindClose 1034->1035 1035->1033
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,007B5222), ref: 007DDBCE
                                                          • GetFileAttributesW.KERNELBASE(?), ref: 007DDBDD
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 007DDBEE
                                                          • FindClose.KERNEL32(00000000), ref: 007DDBFA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFind$AttributesCloseFirstlstrlen
                                                          • String ID:
                                                          • API String ID: 2695905019-0
                                                          • Opcode ID: 9da2969af5ca1a681dd1c0bd99ad95f3e2a09ecd4f7a89978d961e7e29c0df3e
                                                          • Instruction ID: 1c4864f2a8bf153d9fd9eceb6d7889bd6e351290b8fb1e8ad864f54c1ba9195a
                                                          • Opcode Fuzzy Hash: 9da2969af5ca1a681dd1c0bd99ad95f3e2a09ecd4f7a89978d961e7e29c0df3e
                                                          • Instruction Fuzzy Hash: 62F0A0308209105BC2306F78AC0E8BA377CAE01334F204703F83AD22E1EBB45D5486A5
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(007A28E9,?,00794CBE,007A28E9,008388B8,0000000C,00794E15,007A28E9,00000002,00000000,?,007A28E9), ref: 00794D09
                                                          • TerminateProcess.KERNEL32(00000000,?,00794CBE,007A28E9,008388B8,0000000C,00794E15,007A28E9,00000002,00000000,?,007A28E9), ref: 00794D10
                                                          • ExitProcess.KERNEL32 ref: 00794D22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CurrentExitTerminate
                                                          • String ID:
                                                          • API String ID: 1703294689-0
                                                          • Opcode ID: d99c33be8ebb6cb8d5c73680510ac5af609fb6933676ebf4ea242b8abd4af8b8
                                                          • Instruction ID: 66b174754b8d379d108f0dda24cbe19e51c53bb5a8de3e6c30f89d6dbb8fbd7d
                                                          • Opcode Fuzzy Hash: d99c33be8ebb6cb8d5c73680510ac5af609fb6933676ebf4ea242b8abd4af8b8
                                                          • Instruction Fuzzy Hash: F2E0B635110548ABCF55AF64ED09E583B69FB46781B118114FD058A232CB39DD42CA80

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 7faff9-7fb056 call 792340 3 7fb058-7fb06b call 77b567 0->3 4 7fb094-7fb098 0->4 12 7fb06d-7fb092 call 77b567 * 2 3->12 13 7fb0c8 3->13 5 7fb0dd-7fb0e0 4->5 6 7fb09a-7fb0bb call 77b567 * 2 4->6 8 7fb0f5-7fb119 call 777510 call 777620 5->8 9 7fb0e2-7fb0e5 5->9 30 7fb0bf-7fb0c4 6->30 32 7fb11f-7fb178 call 777510 call 777620 call 777510 call 777620 call 777510 call 777620 8->32 33 7fb1d8-7fb1e0 8->33 14 7fb0e8-7fb0ed call 77b567 9->14 12->30 21 7fb0cb-7fb0cf 13->21 14->8 26 7fb0d9-7fb0db 21->26 27 7fb0d1-7fb0d7 21->27 26->5 26->8 27->14 30->5 34 7fb0c6 30->34 81 7fb17a-7fb195 call 777510 call 777620 32->81 82 7fb1a6-7fb1d6 GetSystemDirectoryW call 78fe0b GetSystemDirectoryW 32->82 35 7fb20a-7fb238 GetCurrentDirectoryW call 78fe0b GetCurrentDirectoryW 33->35 36 7fb1e2-7fb1fd call 777510 call 777620 33->36 34->21 45 7fb23c 35->45 36->35 53 7fb1ff-7fb208 call 794963 36->53 47 7fb240-7fb244 45->47 50 7fb246-7fb270 call 779c6e * 3 47->50 51 7fb275-7fb285 call 7e00d9 47->51 50->51 64 7fb28b-7fb2e1 call 7e07c0 call 7e06e6 call 7e05a7 51->64 65 7fb287-7fb289 51->65 53->35 53->51 68 7fb2ee-7fb2f2 64->68 96 7fb2e3 64->96 65->68 70 7fb39a-7fb3be CreateProcessW 68->70 71 7fb2f8-7fb321 call 7d11c8 68->71 75 7fb3c1-7fb3d4 call 78fe14 * 2 70->75 87 7fb32a call 7d14ce 71->87 88 7fb323-7fb328 call 7d1201 71->88 101 7fb42f-7fb43d CloseHandle 75->101 102 7fb3d6-7fb3e8 75->102 81->82 107 7fb197-7fb1a0 call 794963 81->107 82->45 100 7fb32f-7fb33c call 794963 87->100 88->100 96->68 117 7fb33e-7fb345 100->117 118 7fb347-7fb357 call 794963 100->118 109 7fb43f-7fb444 101->109 110 7fb49c 101->110 105 7fb3ed-7fb3fc 102->105 106 7fb3ea 102->106 113 7fb3fe 105->113 114 7fb401-7fb42a GetLastError call 77630c call 77cfa0 105->114 106->105 107->47 107->82 111 7fb446-7fb44c CloseHandle 109->111 112 7fb451-7fb456 109->112 115 7fb4a0-7fb4a4 110->115 111->112 120 7fb458-7fb45e CloseHandle 112->120 121 7fb463-7fb468 112->121 113->114 130 7fb4e5-7fb4f6 call 7e0175 114->130 123 7fb4a6-7fb4b0 115->123 124 7fb4b2-7fb4bc 115->124 117->117 117->118 134 7fb359-7fb360 118->134 135 7fb362-7fb372 call 794963 118->135 120->121 127 7fb46a-7fb470 CloseHandle 121->127 128 7fb475-7fb49a call 7e09d9 call 7fb536 121->128 123->130 131 7fb4be 124->131 132 7fb4c4-7fb4e3 call 77cfa0 CloseHandle 124->132 127->128 128->115 131->132 132->130 134->134 134->135 146 7fb37d-7fb398 call 78fe14 * 3 135->146 147 7fb374-7fb37b 135->147 146->75 147->146 147->147
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 007FB198
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 007FB1B0
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 007FB1D4
                                                          • _wcslen.LIBCMT ref: 007FB200
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 007FB214
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 007FB236
                                                          • _wcslen.LIBCMT ref: 007FB332
                                                            • Part of subcall function 007E05A7: GetStdHandle.KERNEL32(000000F6), ref: 007E05C6
                                                          • _wcslen.LIBCMT ref: 007FB34B
                                                          • _wcslen.LIBCMT ref: 007FB366
                                                          • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 007FB3B6
                                                          • GetLastError.KERNEL32(00000000), ref: 007FB407
                                                          • CloseHandle.KERNEL32(?), ref: 007FB439
                                                          • CloseHandle.KERNEL32(00000000), ref: 007FB44A
                                                          • CloseHandle.KERNEL32(00000000), ref: 007FB45C
                                                          • CloseHandle.KERNEL32(00000000), ref: 007FB46E
                                                          • CloseHandle.KERNEL32(?), ref: 007FB4E3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 2178637699-0
                                                          • Opcode ID: 096016a646affc39283a1a60248be1c7006ecbcaffee90c4627b2de0476c326e
                                                          • Instruction ID: 0475648af70aa50abac8014177626b73a76a5d3c8c79cd85286cd4420aecbf7e
                                                          • Opcode Fuzzy Hash: 096016a646affc39283a1a60248be1c7006ecbcaffee90c4627b2de0476c326e
                                                          • Instruction Fuzzy Hash: D1F18A31608244DFCB14EF24C885B2EBBE1AF85354F14895DF9998B3A2CB39EC44CB52
                                                          APIs
                                                          • GetInputState.USER32 ref: 0077D807
                                                          • timeGetTime.WINMM ref: 0077DA07
                                                          • Sleep.KERNELBASE(0000000A), ref: 0077DBB1
                                                          • Sleep.KERNEL32(0000000A), ref: 007C2B76
                                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 007C2C11
                                                          • WaitForSingleObject.KERNEL32(?,00000000), ref: 007C2C29
                                                          • CloseHandle.KERNEL32(?), ref: 007C2C3D
                                                          • Sleep.KERNEL32(?,CCCCCCCC,00000000), ref: 007C2CA9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Sleep$CloseCodeExitHandleInputObjectProcessSingleStateTimeWaittime
                                                          • String ID:
                                                          • API String ID: 388478766-0
                                                          • Opcode ID: ae708df6df4d593b4351f9fb9d4b70e912fe60006693ba2e281a87e90a1d580d
                                                          • Instruction ID: ba39f8647f94b9fdd74c54d7113db97c74811a5b3adad0701ec3d93e2540f16f
                                                          • Opcode Fuzzy Hash: ae708df6df4d593b4351f9fb9d4b70e912fe60006693ba2e281a87e90a1d580d
                                                          • Instruction Fuzzy Hash: D642CE70608241DFDB39DF24C848F6AB7B0BF86344F54862DE55A872A2D778EC45CB92

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00772D07
                                                          • RegisterClassExW.USER32(00000030), ref: 00772D31
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00772D42
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 00772D5F
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00772D6F
                                                          • LoadIconW.USER32(000000A9), ref: 00772D85
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00772D94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: 893f64c99c6a3fb5c66482d49d915caa3550d7bccf5e37fd56040cce30a34d5b
                                                          • Instruction ID: a58a410bf1bb6095740fb4c18c3ee21614a5570affc121f5e5be9134f83fa7c6
                                                          • Opcode Fuzzy Hash: 893f64c99c6a3fb5c66482d49d915caa3550d7bccf5e37fd56040cce30a34d5b
                                                          • Instruction Fuzzy Hash: 2121C3B5951218AFDF40DFA4EC49BDDBFB4FB09700F00821AF611A62A0D7B55584CF91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 468 7b065b-7b068b call 7b042f 471 7b068d-7b0698 call 79f2c6 468->471 472 7b06a6-7b06b2 call 7a5221 468->472 477 7b069a-7b06a1 call 79f2d9 471->477 478 7b06cb-7b0714 call 7b039a 472->478 479 7b06b4-7b06c9 call 79f2c6 call 79f2d9 472->479 488 7b097d-7b0983 477->488 486 7b0781-7b078a GetFileType 478->486 487 7b0716-7b071f 478->487 479->477 493 7b078c-7b07bd GetLastError call 79f2a3 CloseHandle 486->493 494 7b07d3-7b07d6 486->494 491 7b0721-7b0725 487->491 492 7b0756-7b077c GetLastError call 79f2a3 487->492 491->492 497 7b0727-7b0754 call 7b039a 491->497 492->477 493->477 505 7b07c3-7b07ce call 79f2d9 493->505 495 7b07d8-7b07dd 494->495 496 7b07df-7b07e5 494->496 500 7b07e9-7b0837 call 7a516a 495->500 496->500 501 7b07e7 496->501 497->486 497->492 511 7b0839-7b0845 call 7b05ab 500->511 512 7b0847-7b086b call 7b014d 500->512 501->500 505->477 511->512 519 7b086f-7b0879 call 7a86ae 511->519 517 7b087e-7b08c1 512->517 518 7b086d 512->518 521 7b08c3-7b08c7 517->521 522 7b08e2-7b08f0 517->522 518->519 519->488 521->522 524 7b08c9-7b08dd 521->524 525 7b097b 522->525 526 7b08f6-7b08fa 522->526 524->522 525->488 526->525 527 7b08fc-7b092f CloseHandle call 7b039a 526->527 530 7b0963-7b0977 527->530 531 7b0931-7b095d GetLastError call 79f2a3 call 7a5333 527->531 530->525 531->530
                                                          APIs
                                                            • Part of subcall function 007B039A: CreateFileW.KERNELBASE(00000000,00000000,?,007B0704,?,?,00000000,?,007B0704,00000000,0000000C), ref: 007B03B7
                                                          • GetLastError.KERNEL32 ref: 007B076F
                                                          • __dosmaperr.LIBCMT ref: 007B0776
                                                          • GetFileType.KERNELBASE(00000000), ref: 007B0782
                                                          • GetLastError.KERNEL32 ref: 007B078C
                                                          • __dosmaperr.LIBCMT ref: 007B0795
                                                          • CloseHandle.KERNEL32(00000000), ref: 007B07B5
                                                          • CloseHandle.KERNEL32(?), ref: 007B08FF
                                                          • GetLastError.KERNEL32 ref: 007B0931
                                                          • __dosmaperr.LIBCMT ref: 007B0938
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                          • String ID: H
                                                          • API String ID: 4237864984-2852464175
                                                          • Opcode ID: 7c3229a8449b0a98bf12c225bb7133071f8232c29447e9f453878cae68a260f3
                                                          • Instruction ID: 474caa6ba15c17d8fc4760db6a351cc596a405d87a09ea6e22ff3e30cdac3da5
                                                          • Opcode Fuzzy Hash: 7c3229a8449b0a98bf12c225bb7133071f8232c29447e9f453878cae68a260f3
                                                          • Instruction Fuzzy Hash: 1FA12336A141088FDF19AF68D856BEE7BA0AB46324F14029DF811DB3D1DB399912CBD1

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00773A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00841418,?,00772E7F,?,?,?,00000000), ref: 00773A78
                                                            • Part of subcall function 00773357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00773379
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0077356A
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 007B318D
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 007B31CE
                                                          • RegCloseKey.ADVAPI32(?), ref: 007B3210
                                                          • _wcslen.LIBCMT ref: 007B3277
                                                          • _wcslen.LIBCMT ref: 007B3286
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                          • API String ID: 98802146-2727554177
                                                          • Opcode ID: ab57b459918b52d625333b69002dad2cba192d5f2fbfd2d5999f0db80f1d3796
                                                          • Instruction ID: 4f7f01f5cd69339a39efd497d3c489cab682867a3e6fdfd5a4e41c237364adfb
                                                          • Opcode Fuzzy Hash: ab57b459918b52d625333b69002dad2cba192d5f2fbfd2d5999f0db80f1d3796
                                                          • Instruction Fuzzy Hash: 51716C71508301DEC714EF69DC8699BBBF8FF95780B80452EF559832B1DB389A48CB62

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00772B8E
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00772B9D
                                                          • LoadIconW.USER32(00000063), ref: 00772BB3
                                                          • LoadIconW.USER32(000000A4), ref: 00772BC5
                                                          • LoadIconW.USER32(000000A2), ref: 00772BD7
                                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00772BEF
                                                          • RegisterClassExW.USER32(?), ref: 00772C40
                                                            • Part of subcall function 00772CD4: GetSysColorBrush.USER32(0000000F), ref: 00772D07
                                                            • Part of subcall function 00772CD4: RegisterClassExW.USER32(00000030), ref: 00772D31
                                                            • Part of subcall function 00772CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00772D42
                                                            • Part of subcall function 00772CD4: InitCommonControlsEx.COMCTL32(?), ref: 00772D5F
                                                            • Part of subcall function 00772CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00772D6F
                                                            • Part of subcall function 00772CD4: LoadIconW.USER32(000000A9), ref: 00772D85
                                                            • Part of subcall function 00772CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00772D94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                          • String ID: #$0$AutoIt v3
                                                          • API String ID: 423443420-4155596026
                                                          • Opcode ID: 2942e138c8e80b0fb19930b4a6174b8ff5211a1dfda8070807fdb9419a998f60
                                                          • Instruction ID: 7f5616e04ce0bca74621bd0e09d6e1c82ea56cb8af6421c05873718bf082b31d
                                                          • Opcode Fuzzy Hash: 2942e138c8e80b0fb19930b4a6174b8ff5211a1dfda8070807fdb9419a998f60
                                                          • Instruction Fuzzy Hash: 41212C78E40318ABDF109FA9EC59B99BFB4FB49B50F00451AF504A67A0D7B90580CF90

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 609 773170-773185 610 773187-77318a 609->610 611 7731e5-7731e7 609->611 612 77318c-773193 610->612 613 7731eb 610->613 611->610 614 7731e9 611->614 615 773265-77326d PostQuitMessage 612->615 616 773199-77319e 612->616 618 7b2dfb-7b2e23 call 7718e2 call 78e499 613->618 619 7731f1-7731f6 613->619 617 7731d0-7731d8 DefWindowProcW 614->617 624 773219-77321b 615->624 621 7731a4-7731a8 616->621 622 7b2e7c-7b2e90 call 7dbf30 616->622 623 7731de-7731e4 617->623 653 7b2e28-7b2e2f 618->653 625 77321d-773244 SetTimer RegisterWindowMessageW 619->625 626 7731f8-7731fb 619->626 628 7b2e68-7b2e72 call 7dc161 621->628 629 7731ae-7731b3 621->629 622->624 647 7b2e96 622->647 624->623 625->624 630 773246-773251 CreatePopupMenu 625->630 632 773201-77320f KillTimer call 7730f2 626->632 633 7b2d9c-7b2d9f 626->633 643 7b2e77 628->643 636 7b2e4d-7b2e54 629->636 637 7731b9-7731be 629->637 630->624 642 773214 call 773c50 632->642 639 7b2da1-7b2da5 633->639 640 7b2dd7-7b2df6 MoveWindow 633->640 636->617 650 7b2e5a-7b2e63 call 7d0ad7 636->650 645 7731c4-7731ca 637->645 646 773253-773263 call 77326f 637->646 648 7b2da7-7b2daa 639->648 649 7b2dc6-7b2dd2 SetFocus 639->649 640->624 642->624 643->624 645->617 645->653 646->624 647->617 648->645 654 7b2db0-7b2dc1 call 7718e2 648->654 649->624 650->617 653->617 658 7b2e35-7b2e48 call 7730f2 call 773837 653->658 654->624 658->617
                                                          APIs
                                                          • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0077316A,?,?), ref: 007731D8
                                                          • KillTimer.USER32(?,00000001,?,?,?,?,?,0077316A,?,?), ref: 00773204
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00773227
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0077316A,?,?), ref: 00773232
                                                          • CreatePopupMenu.USER32 ref: 00773246
                                                          • PostQuitMessage.USER32(00000000), ref: 00773267
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                          • String ID: TaskbarCreated
                                                          • API String ID: 129472671-2362178303
                                                          • Opcode ID: 642648565b072523f7369a77e0c6c183b73265c1aef483485f2aa55ad3721ab8
                                                          • Instruction ID: 6f69d68ab85ab86e9c3705f27b65321cc3e4328f5edf686bc172033e159ce5ac
                                                          • Opcode Fuzzy Hash: 642648565b072523f7369a77e0c6c183b73265c1aef483485f2aa55ad3721ab8
                                                          • Instruction Fuzzy Hash: 52410635254208EBDF155F7C9C0DBB93B5AF7063C4F548225F90AC62A2C77D8A81E7A2

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 665 771410-771449 666 7b24b8-7b24b9 DestroyWindow 665->666 667 77144f-771465 mciSendStringW 665->667 670 7b24c4-7b24d1 666->670 668 7716c6-7716d3 667->668 669 77146b-771473 667->669 672 7716d5-7716f0 UnregisterHotKey 668->672 673 7716f8-7716ff 668->673 669->670 671 771479-771488 call 77182e 669->671 674 7b24d3-7b24d6 670->674 675 7b2500-7b2507 670->675 686 7b250e-7b251a 671->686 687 77148e-771496 671->687 672->673 677 7716f2-7716f3 call 7710d0 672->677 673->669 678 771705 673->678 679 7b24d8-7b24e0 call 776246 674->679 680 7b24e2-7b24e5 FindClose 674->680 675->670 683 7b2509 675->683 677->673 678->668 685 7b24eb-7b24f8 679->685 680->685 683->686 685->675 689 7b24fa-7b24fb call 7e32b1 685->689 692 7b251c-7b251e FreeLibrary 686->692 693 7b2524-7b252b 686->693 690 7b2532-7b253f 687->690 691 77149c-7714c1 call 77cfa0 687->691 689->675 694 7b2541-7b255e VirtualFree 690->694 695 7b2566-7b256d 690->695 703 7714c3 691->703 704 7714f8-771503 CoUninitialize 691->704 692->693 693->686 698 7b252d 693->698 694->695 699 7b2560-7b2561 call 7e3317 694->699 695->690 700 7b256f 695->700 698->690 699->695 706 7b2574-7b2578 700->706 707 7714c6-7714f6 call 771a05 call 7719ae 703->707 705 771509-77150e 704->705 704->706 708 7b2589-7b2596 call 7e32eb 705->708 709 771514-77151e 705->709 706->705 710 7b257e-7b2584 706->710 707->704 723 7b2598 708->723 712 771707-771714 call 78f80e 709->712 713 771524-7715a5 call 77988f call 771944 call 7717d5 call 78fe14 call 77177c call 77988f call 77cfa0 call 7717fe call 78fe14 709->713 710->705 712->713 726 77171a 712->726 727 7b259d-7b25bf call 78fdcd 713->727 755 7715ab-7715cf call 78fe14 713->755 723->727 726->712 733 7b25c1 727->733 736 7b25c6-7b25e8 call 78fdcd 733->736 742 7b25ea 736->742 746 7b25ef-7b2611 call 78fdcd 742->746 752 7b2613 746->752 754 7b2618-7b2625 call 7d64d4 752->754 760 7b2627 754->760 755->736 761 7715d5-7715f9 call 78fe14 755->761 763 7b262c-7b2639 call 78ac64 760->763 761->746 766 7715ff-771619 call 78fe14 761->766 769 7b263b 763->769 766->754 771 77161f-771643 call 7717d5 call 78fe14 766->771 773 7b2640-7b264d call 7e3245 769->773 771->763 780 771649-771651 771->780 779 7b264f 773->779 782 7b2654-7b2661 call 7e32cc 779->782 780->773 781 771657-771675 call 77988f call 77190a 780->781 781->782 791 77167b-771689 781->791 787 7b2663 782->787 790 7b2668-7b2675 call 7e32cc 787->790 796 7b2677 790->796 791->790 793 77168f-7716c5 call 77988f * 3 call 771876 791->793 796->796
                                                          APIs
                                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00771459
                                                          • CoUninitialize.COMBASE ref: 007714F8
                                                          • UnregisterHotKey.USER32(?), ref: 007716DD
                                                          • DestroyWindow.USER32(?), ref: 007B24B9
                                                          • FreeLibrary.KERNEL32(?), ref: 007B251E
                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 007B254B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                          • String ID: close all
                                                          • API String ID: 469580280-3243417748
                                                          • Opcode ID: d119f40d77bdcc6934b7b0a8aa744cfaca271b56357f090a49afeac4f3e0daaa
                                                          • Instruction ID: 1c4fa35659187f8dbd7ffbfc539e20e7f6e0a3e64be04c4f049ca4637e9e571d
                                                          • Opcode Fuzzy Hash: d119f40d77bdcc6934b7b0a8aa744cfaca271b56357f090a49afeac4f3e0daaa
                                                          • Instruction Fuzzy Hash: 2DD17331702212CFCB29EF15C899B69F7A4BF05740F5482ADE54AA7252DB38AD23CF51

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 814 772c63-772cd3 CreateWindowExW * 2 ShowWindow * 2
                                                          APIs
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00772C91
                                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00772CB2
                                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00771CAD,?), ref: 00772CC6
                                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00771CAD,?), ref: 00772CCF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateShow
                                                          • String ID: AutoIt v3$edit
                                                          • API String ID: 1584632944-3779509399
                                                          • Opcode ID: c4067400e15aa2a402dd75bbd12eac1ec8794052d72cbb5b3fc7bef98890abda
                                                          • Instruction ID: 3d2de8467d88cac014a5e5b578bc03c1faf19bd696fa90a1cb4632c3f7563cfe
                                                          • Opcode Fuzzy Hash: c4067400e15aa2a402dd75bbd12eac1ec8794052d72cbb5b3fc7bef98890abda
                                                          • Instruction Fuzzy Hash: 55F0DA795402907AEB711F17AC4CE776EBDF7C7F50B00005AF900A26A0C6691894DAB0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 965 773b1c-773b27 966 773b99-773b9b 965->966 967 773b29-773b2e 965->967 968 773b8c-773b8f 966->968 967->966 969 773b30-773b48 RegOpenKeyExW 967->969 969->966 970 773b4a-773b69 RegQueryValueExW 969->970 971 773b80-773b8b RegCloseKey 970->971 972 773b6b-773b76 970->972 971->968 973 773b90-773b97 972->973 974 773b78-773b7a 972->974 975 773b7e 973->975 974->975 975->971
                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00773B0F,SwapMouseButtons,00000004,?), ref: 00773B40
                                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00773B0F,SwapMouseButtons,00000004,?), ref: 00773B61
                                                          • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00773B0F,SwapMouseButtons,00000004,?), ref: 00773B83
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID: Control Panel\Mouse
                                                          • API String ID: 3677997916-824357125
                                                          • Opcode ID: 339d531ad78d0b2e892f372b5c0bc193a7e46492e00eea651472e40deb3d2d02
                                                          • Instruction ID: 403b30edb2e5cc7d71ea9a2a16c2b972359a08b309ae91105d4585866afb87ac
                                                          • Opcode Fuzzy Hash: 339d531ad78d0b2e892f372b5c0bc193a7e46492e00eea651472e40deb3d2d02
                                                          • Instruction Fuzzy Hash: 0B112AB5510208FFDF208FA5DC44AEEB7BCEF04784B10856AA809D7120E2359E40A7A0
                                                          APIs
                                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 007B33A2
                                                            • Part of subcall function 00776B57: _wcslen.LIBCMT ref: 00776B6A
                                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00773A04
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: IconLoadNotifyShell_String_wcslen
                                                          • String ID: Line:
                                                          • API String ID: 2289894680-1585850449
                                                          • Opcode ID: 2106e03ee347b6357f1031fbfca6421135efb13a8d363e447444ed10db4bcfea
                                                          • Instruction ID: f7e5da831a1d80b24195083a95b628124830ce4ddc76eb2099889f562c290fc5
                                                          • Opcode Fuzzy Hash: 2106e03ee347b6357f1031fbfca6421135efb13a8d363e447444ed10db4bcfea
                                                          • Instruction Fuzzy Hash: 5C31C771508304EACB21EF20DC49BEBB7D8BB41754F00891AF59D83191DB7C9688CBC2
                                                          APIs
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00790668
                                                            • Part of subcall function 007932A4: RaiseException.KERNEL32(?,?,?,0079068A,?,00841444,?,?,?,?,?,?,0079068A,00771129,00838738,00771129), ref: 00793304
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00790685
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$ExceptionRaise
                                                          • String ID: Unknown exception
                                                          • API String ID: 3476068407-410509341
                                                          • Opcode ID: 3fc7869e7e41e337ecb5bbae9848f05ab69cf4f36532c6b6025839b8c20a05ab
                                                          • Instruction ID: a0dd8e315083db8a9162737ac34c9f79ac1c64349f01e4ad05b6549dd193eecb
                                                          • Opcode Fuzzy Hash: 3fc7869e7e41e337ecb5bbae9848f05ab69cf4f36532c6b6025839b8c20a05ab
                                                          • Instruction Fuzzy Hash: 42F0623490030DFBCF04B6A4F85AD9E776CAE40350B608571FA24D65D2EF79EA66C6D0
                                                          APIs
                                                            • Part of subcall function 00771BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00771BF4
                                                            • Part of subcall function 00771BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00771BFC
                                                            • Part of subcall function 00771BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00771C07
                                                            • Part of subcall function 00771BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00771C12
                                                            • Part of subcall function 00771BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00771C1A
                                                            • Part of subcall function 00771BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00771C22
                                                            • Part of subcall function 00771B4A: RegisterWindowMessageW.USER32(00000004,?,007712C4), ref: 00771BA2
                                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0077136A
                                                          • OleInitialize.OLE32 ref: 00771388
                                                          • CloseHandle.KERNEL32(00000000,00000000), ref: 007B24AB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                          • String ID:
                                                          • API String ID: 1986988660-0
                                                          • Opcode ID: eed34adff1ecd7233758814076a7ad9b5279819aa2cca5e887b9a6fe9c818b4b
                                                          • Instruction ID: b0cc87b94a95e4694ea8b3beb34b29e01a12d45ab3d80a359ded78314b6cb5b9
                                                          • Opcode Fuzzy Hash: eed34adff1ecd7233758814076a7ad9b5279819aa2cca5e887b9a6fe9c818b4b
                                                          • Instruction Fuzzy Hash: 077199BCA513048ECF84EFB9EC4D6957AE1FB9A384356823AD61AC7261EB3444C5CF44
                                                          APIs
                                                            • Part of subcall function 00773923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00773A04
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 007DC259
                                                          • KillTimer.USER32(?,00000001,?,?), ref: 007DC261
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 007DC270
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_Timer$Kill
                                                          • String ID:
                                                          • API String ID: 3500052701-0
                                                          • Opcode ID: 1b69db6d69ed8f6a0f2c335726ba4ecadcbe75f1ae8dacd746c63f12ceb366c2
                                                          • Instruction ID: d0c06c6f7f93669f4e879439193a841e22bbbc1698f4b29342942916533cdd0c
                                                          • Opcode Fuzzy Hash: 1b69db6d69ed8f6a0f2c335726ba4ecadcbe75f1ae8dacd746c63f12ceb366c2
                                                          • Instruction Fuzzy Hash: 40318470904354AFEB739F648895BE7BBFCAB06304F00049AE6DA97241C7786A84CB51
                                                          APIs
                                                          • CloseHandle.KERNELBASE(00000000,00000000,?,?,007A85CC,?,00838CC8,0000000C), ref: 007A8704
                                                          • GetLastError.KERNEL32(?,007A85CC,?,00838CC8,0000000C), ref: 007A870E
                                                          • __dosmaperr.LIBCMT ref: 007A8739
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseErrorHandleLast__dosmaperr
                                                          • String ID:
                                                          • API String ID: 2583163307-0
                                                          • Opcode ID: 6fb9f3e1cbb23ea0a1a7812ba7e94642f17cd7067dceeb7897da0946940cb336
                                                          • Instruction ID: 5556a212c1223b67c6c300bad404f98ed10b76cfcc0f567d579aa77dded96fc9
                                                          • Opcode Fuzzy Hash: 6fb9f3e1cbb23ea0a1a7812ba7e94642f17cd7067dceeb7897da0946940cb336
                                                          • Instruction Fuzzy Hash: F6018933A0562066EAE46334A849B7E67495BC3778F390319F8048B1D3DEBCCC81C192
                                                          APIs
                                                          • TranslateMessage.USER32(?), ref: 0077DB7B
                                                          • DispatchMessageW.USER32(?), ref: 0077DB89
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0077DB9F
                                                          • Sleep.KERNELBASE(0000000A), ref: 0077DBB1
                                                          • TranslateAcceleratorW.USER32(?,?,?), ref: 007C1CC9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                          • String ID:
                                                          • API String ID: 3288985973-0
                                                          • Opcode ID: f4bb07e8a8394910f0771a0593092de3b13c30d25407913db643a9361dd3a113
                                                          • Instruction ID: eaca16f26586fb18287dc74a8a7cad021f2c0ca66d81f804401dae119f5d0f6b
                                                          • Opcode Fuzzy Hash: f4bb07e8a8394910f0771a0593092de3b13c30d25407913db643a9361dd3a113
                                                          • Instruction Fuzzy Hash: 08F05E306443449BEB70CBA48C49FAA73B8FF45350F508A2CF61AD30D0DB38A488CB25
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 007817F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID: CALL
                                                          • API String ID: 1385522511-4196123274
                                                          • Opcode ID: 5031491c546ab92e8d2659a7f1d94baa2e215a6ed293e2d8411759996e2962f2
                                                          • Instruction ID: 5b5ebe2b504d1a7e6e8d5e01511acb0ff4ecdcfc3218dbe586aa9e5e45c85e27
                                                          • Opcode Fuzzy Hash: 5031491c546ab92e8d2659a7f1d94baa2e215a6ed293e2d8411759996e2962f2
                                                          • Instruction Fuzzy Hash: 6E229B70608241DFC714EF14C484B2ABBF5BF89314F64896DF49A8B3A1D739E952CB92
                                                          APIs
                                                          • GetOpenFileNameW.COMDLG32(?), ref: 007B2C8C
                                                            • Part of subcall function 00773AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00773A97,?,?,00772E7F,?,?,?,00000000), ref: 00773AC2
                                                            • Part of subcall function 00772DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00772DC4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Name$Path$FileFullLongOpen
                                                          • String ID: X
                                                          • API String ID: 779396738-3081909835
                                                          • Opcode ID: 64025cfa020292e388af977e41b3b9b18e06db28fed2dc0b9d6d12228c4d9ed3
                                                          • Instruction ID: 6956901a8678da0c45c81492da52c10d92f22626828ed4ee762e2b133e2593c6
                                                          • Opcode Fuzzy Hash: 64025cfa020292e388af977e41b3b9b18e06db28fed2dc0b9d6d12228c4d9ed3
                                                          • Instruction Fuzzy Hash: AD219671A00258AFDF41DF94C8497EE7BF8AF49304F108059E519E7242DBBC5A49CFA1
                                                          APIs
                                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00773908
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_
                                                          • String ID:
                                                          • API String ID: 1144537725-0
                                                          • Opcode ID: 8a5ae637cb9f6dd447cec89fb20ec4e77fde0ade2c20cc102ebb193dacad2a8c
                                                          • Instruction ID: 27796081fbed012f967c87d7fbb697cd61451631a5f1bb5cc7248fe868c32a4d
                                                          • Opcode Fuzzy Hash: 8a5ae637cb9f6dd447cec89fb20ec4e77fde0ade2c20cc102ebb193dacad2a8c
                                                          • Instruction Fuzzy Hash: 4D319170504701DFDB20DF24D889B97BBE8FB49748F00092EF59983340E779AA84DB52
                                                          APIs
                                                          • timeGetTime.WINMM ref: 0078F661
                                                            • Part of subcall function 0077D730: GetInputState.USER32 ref: 0077D807
                                                          • Sleep.KERNEL32(00000000), ref: 007CF2DE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: InputSleepStateTimetime
                                                          • String ID:
                                                          • API String ID: 4149333218-0
                                                          • Opcode ID: 8d9ec5c68e0b874e1e7c3b19bab64719398acd19775601d8ea30975dbd2a6d45
                                                          • Instruction ID: 0a1e0706922343e13d9b9f31c11d7178ff3195612bd35201e4f9358cfcfe2d0a
                                                          • Opcode Fuzzy Hash: 8d9ec5c68e0b874e1e7c3b19bab64719398acd19775601d8ea30975dbd2a6d45
                                                          • Instruction Fuzzy Hash: 8CF08C313402059FD354EF69D449B6AB7E8FF497A5F00412AE85DC72A0DB70A800CB91
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 0077BB4E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID:
                                                          • API String ID: 1385522511-0
                                                          • Opcode ID: 3afccee5eedf30b0d8455d41411d1cde1772b7e6e5c426273642287a1284f8bf
                                                          • Instruction ID: 820c6f288ef3f961f4998e9a7d72345e56da3849b69294d9a8d4b9ff4f3d2d85
                                                          • Opcode Fuzzy Hash: 3afccee5eedf30b0d8455d41411d1cde1772b7e6e5c426273642287a1284f8bf
                                                          • Instruction Fuzzy Hash: 66329874A04209DFDF24CF54C898BBAB7B9FF44384F19805DEA19AB261C778AD41CB91
                                                          APIs
                                                            • Part of subcall function 00774E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00774EDD,?,00841418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00774E9C
                                                            • Part of subcall function 00774E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00774EAE
                                                            • Part of subcall function 00774E90: FreeLibrary.KERNEL32(00000000,?,?,00774EDD,?,00841418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00774EC0
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00841418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00774EFD
                                                            • Part of subcall function 00774E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,007B3CDE,?,00841418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00774E62
                                                            • Part of subcall function 00774E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00774E74
                                                            • Part of subcall function 00774E59: FreeLibrary.KERNEL32(00000000,?,?,007B3CDE,?,00841418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00774E87
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$Load$AddressFreeProc
                                                          • String ID:
                                                          • API String ID: 2632591731-0
                                                          • Opcode ID: c68454c88933c01f53e9312178b74f3c7d34d5518990e9237908b5ebd4f8ab42
                                                          • Instruction ID: fa43e3570ee256d36b626ff4c64104ceee6a00083441042bee2c569c0983302d
                                                          • Opcode Fuzzy Hash: c68454c88933c01f53e9312178b74f3c7d34d5518990e9237908b5ebd4f8ab42
                                                          • Instruction Fuzzy Hash: AB11E332600205EBDF24FF60DC0AFAD77A5AF40790F10C42DF54AA61C1EFB89A459750
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: __wsopen_s
                                                          • String ID:
                                                          • API String ID: 3347428461-0
                                                          • Opcode ID: 6c36f8dbf7f239aefb384a2e57d3f23275f03ae44e3e09aa3cd12d5540f9a315
                                                          • Instruction ID: c800806eaabffa8699e86dbfa8868b28a66bf8fc5186d8b3ee4ebf9a6589bcf1
                                                          • Opcode Fuzzy Hash: 6c36f8dbf7f239aefb384a2e57d3f23275f03ae44e3e09aa3cd12d5540f9a315
                                                          • Instruction Fuzzy Hash: 3811187590420AAFCB05DF58E94599B7BF9EF49314F104159F808AB312DA31EA11CBA5
                                                          APIs
                                                            • Part of subcall function 007A4C7D: RtlAllocateHeap.NTDLL(00000008,00771129,00000000,?,007A2E29,00000001,00000364,?,?,?,0079F2DE,007A3863,00841444,?,0078FDF5,?), ref: 007A4CBE
                                                          • _free.LIBCMT ref: 007A506C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap_free
                                                          • String ID:
                                                          • API String ID: 614378929-0
                                                          • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                          • Instruction ID: e4cb17f3c06a4ddde0cde58623d70e90ada3ff7049099e7f3f6e4a63f26c7ce1
                                                          • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                          • Instruction Fuzzy Hash: B0012672204704ABE3218F699885A5BFBE8FBCA370F25071DE18493280EA74A805C6B4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                          • Instruction ID: d90a8415707dc27db12168e20024d489030889cf2992ae3e6fcbf661123af464
                                                          • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                          • Instruction Fuzzy Hash: 8BF0A932511E14EADE317A69AC09B5B33989FD3335F100715F525962D2DB7CE8028AA6
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000008,00771129,00000000,?,007A2E29,00000001,00000364,?,?,?,0079F2DE,007A3863,00841444,?,0078FDF5,?), ref: 007A4CBE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: 609b111b8380d14a2c333b553f928da51d6f076430a83f9d6fb17cc007901a59
                                                          • Instruction ID: 893444c4ec23d70eb048be162c0ba246903bf56b1b356086916fa1c8ab00bdb9
                                                          • Opcode Fuzzy Hash: 609b111b8380d14a2c333b553f928da51d6f076430a83f9d6fb17cc007901a59
                                                          • Instruction Fuzzy Hash: FAF0BB32606124A6DF215F619C09F5A3749BFC3770B144311B81D96181DAFAD80146B0
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000000,?,00841444,?,0078FDF5,?,?,0077A976,00000010,00841440,007713FC,?,007713C6,?,00771129), ref: 007A3852
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: 99807f7a31395ee0286ea8dd7813a9a832993e00c94b2d9b1f0c25f4444dd32f
                                                          • Instruction ID: aa7b2d43432d4670193735ed5150aaff6971e8324b8db0ba5a691f42a0f4d766
                                                          • Opcode Fuzzy Hash: 99807f7a31395ee0286ea8dd7813a9a832993e00c94b2d9b1f0c25f4444dd32f
                                                          • Instruction Fuzzy Hash: 04E065325012259AEB212F66AC09F9A3659AFC37B0F150322BC1596591DB1DDD0182F1
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,?,00841418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00774F6D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: 986413d1ee4182c0afe29ab3854cd3e208ae498f13d35e3b08ae5ed90533c57b
                                                          • Instruction ID: 7b1688d0ae0af409a89f8e324b66c5a15e17dc4a64027142479fe3df4c4a8d51
                                                          • Opcode Fuzzy Hash: 986413d1ee4182c0afe29ab3854cd3e208ae498f13d35e3b08ae5ed90533c57b
                                                          • Instruction Fuzzy Hash: BDF01571206752DFDF349F64E494822BBE4AF15369328CA7EE1EE82621C73A9844DB10
                                                          APIs
                                                          • Shell_NotifyIconW.SHELL32(00000002,?), ref: 0077314E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_
                                                          • String ID:
                                                          • API String ID: 1144537725-0
                                                          • Opcode ID: 6c26579d8fac0f360e8fbc4d539e6e33f560490b1ea9f302a571f15827071944
                                                          • Instruction ID: 34353f22648dcf6c3d10de7065c3aaa1d39b0ab2dc79027a2552f5c94934fb09
                                                          • Opcode Fuzzy Hash: 6c26579d8fac0f360e8fbc4d539e6e33f560490b1ea9f302a571f15827071944
                                                          • Instruction Fuzzy Hash: 07F037749143189FEF629F24DC497D57BFCB701708F0001E5A54896292D77857C8CF51
                                                          APIs
                                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00772DC4
                                                            • Part of subcall function 00776B57: _wcslen.LIBCMT ref: 00776B6A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: LongNamePath_wcslen
                                                          • String ID:
                                                          • API String ID: 541455249-0
                                                          • Opcode ID: 091780d7a1c34290fd5313ad9516adbdb0cc7e231ac62f4f13f00664e64b34ad
                                                          • Instruction ID: 2116da7c1150b5cd3602bd1fd74e02fffae518504655203ecc2ff63900a27c4f
                                                          • Opcode Fuzzy Hash: 091780d7a1c34290fd5313ad9516adbdb0cc7e231ac62f4f13f00664e64b34ad
                                                          • Instruction Fuzzy Hash: C3E0CD726001245BCB1097589C09FEA77DDDFC87D0F044171FD09D725DDA64AD80C550
                                                          APIs
                                                            • Part of subcall function 00773837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00773908
                                                            • Part of subcall function 0077D730: GetInputState.USER32 ref: 0077D807
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00772B6B
                                                            • Part of subcall function 007730F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0077314E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                          • String ID:
                                                          • API String ID: 3667716007-0
                                                          • Opcode ID: 3035251676e52f9e2216941c49d29b1b8709b49cf0025e53f01d4daeb1aa280b
                                                          • Instruction ID: 33496e70b61ee0212e69db35641b166c7828ed22ac8afbcb4038daeed1ddbdef
                                                          • Opcode Fuzzy Hash: 3035251676e52f9e2216941c49d29b1b8709b49cf0025e53f01d4daeb1aa280b
                                                          • Instruction Fuzzy Hash: B3E0862130424886CE18BB75985E56DA75AABD23D5F40953EF14A831A3DF2D498A8252
                                                          APIs
                                                          • CreateFileW.KERNELBASE(00000000,00000000,?,007B0704,?,?,00000000,?,007B0704,00000000,0000000C), ref: 007B03B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: 5608d17db90dd6c1ac2d4240987114979d1103fafd02f0de20ec89d85c4744f3
                                                          • Instruction ID: b4d63ff287a49c7624a510de3b01ecc5cd6c80a6a04995ba8f8095f15ac35792
                                                          • Opcode Fuzzy Hash: 5608d17db90dd6c1ac2d4240987114979d1103fafd02f0de20ec89d85c4744f3
                                                          • Instruction Fuzzy Hash: 51D06C3204010DBBDF028F84DD06EDA3BAAFB48714F014100BE1856020C732E821AB90
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00771CBC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: InfoParametersSystem
                                                          • String ID:
                                                          • API String ID: 3098949447-0
                                                          • Opcode ID: 5ede57056cf2228f8891164fceacc934c81949a9ad052374cf6ac03184f1971f
                                                          • Instruction ID: 6b07b93006cb60d6e9cbc6af98cdbf7e3b0d2cd699968b1f5e8c1eec591e9e5a
                                                          • Opcode Fuzzy Hash: 5ede57056cf2228f8891164fceacc934c81949a9ad052374cf6ac03184f1971f
                                                          • Instruction Fuzzy Hash: 08C0923E280304AFF6648F80BC4EF10B7A4B349F04F448101F609A96E3C3A22860EA50
                                                          APIs
                                                            • Part of subcall function 00789BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00789BB2
                                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0080961A
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0080965B
                                                          • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0080969F
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008096C9
                                                          • SendMessageW.USER32 ref: 008096F2
                                                          • GetKeyState.USER32(00000011), ref: 0080978B
                                                          • GetKeyState.USER32(00000009), ref: 00809798
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 008097AE
                                                          • GetKeyState.USER32(00000010), ref: 008097B8
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008097E9
                                                          • SendMessageW.USER32 ref: 00809810
                                                          • SendMessageW.USER32(?,00001030,?,00807E95), ref: 00809918
                                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0080992E
                                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00809941
                                                          • SetCapture.USER32(?), ref: 0080994A
                                                          • ClientToScreen.USER32(?,?), ref: 008099AF
                                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 008099BC
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008099D6
                                                          • ReleaseCapture.USER32 ref: 008099E1
                                                          • GetCursorPos.USER32(?), ref: 00809A19
                                                          • ScreenToClient.USER32(?,?), ref: 00809A26
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00809A80
                                                          • SendMessageW.USER32 ref: 00809AAE
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00809AEB
                                                          • SendMessageW.USER32 ref: 00809B1A
                                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00809B3B
                                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00809B4A
                                                          • GetCursorPos.USER32(?), ref: 00809B68
                                                          • ScreenToClient.USER32(?,?), ref: 00809B75
                                                          • GetParent.USER32(?), ref: 00809B93
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00809BFA
                                                          • SendMessageW.USER32 ref: 00809C2B
                                                          • ClientToScreen.USER32(?,?), ref: 00809C84
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00809CB4
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00809CDE
                                                          • SendMessageW.USER32 ref: 00809D01
                                                          • ClientToScreen.USER32(?,?), ref: 00809D4E
                                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00809D82
                                                            • Part of subcall function 00789944: GetWindowLongW.USER32(?,000000EB), ref: 00789952
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00809E05
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                          • String ID: @GUI_DRAGID$F
                                                          • API String ID: 3429851547-4164748364
                                                          • Opcode ID: 31f7c8bf63c45681e814dc29e7b81ffef36b2592576bcf77a7309792bd6594ff
                                                          • Instruction ID: 64537cbf6201f95d7ec0923d16be9893de26b924ce2780610f58c9b1818d92fc
                                                          • Opcode Fuzzy Hash: 31f7c8bf63c45681e814dc29e7b81ffef36b2592576bcf77a7309792bd6594ff
                                                          • Instruction Fuzzy Hash: 0742AE35608201AFDBA0CF64CC48AAABBE5FF59314F14461DF6A9C72E2D732E850CB51
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 008048F3
                                                          • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00804908
                                                          • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00804927
                                                          • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0080494B
                                                          • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0080495C
                                                          • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0080497B
                                                          • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 008049AE
                                                          • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 008049D4
                                                          • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00804A0F
                                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00804A56
                                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00804A7E
                                                          • IsMenu.USER32(?), ref: 00804A97
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00804AF2
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00804B20
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00804B94
                                                          • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00804BE3
                                                          • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00804C82
                                                          • wsprintfW.USER32 ref: 00804CAE
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00804CC9
                                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 00804CF1
                                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00804D13
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00804D33
                                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 00804D5A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                          • String ID: %d/%02d/%02d
                                                          • API String ID: 4054740463-328681919
                                                          • Opcode ID: b7f31b80ea057014fb6e7c11a3babe15c43862c2f7aaf2c4c73cc42604b0d0f3
                                                          • Instruction ID: 2ff6f198f0e1b468152af08236ed8725d2a7c34d91ffcadee69d57d9d936f4a9
                                                          • Opcode Fuzzy Hash: b7f31b80ea057014fb6e7c11a3babe15c43862c2f7aaf2c4c73cc42604b0d0f3
                                                          • Instruction Fuzzy Hash: 551213B1680219ABEBA49F24CC49FAE7BF8FF45310F105229F615DB2E1DB749941CB50
                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0078F998
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007CF474
                                                          • IsIconic.USER32(00000000), ref: 007CF47D
                                                          • ShowWindow.USER32(00000000,00000009), ref: 007CF48A
                                                          • SetForegroundWindow.USER32(00000000), ref: 007CF494
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 007CF4AA
                                                          • GetCurrentThreadId.KERNEL32 ref: 007CF4B1
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 007CF4BD
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 007CF4CE
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 007CF4D6
                                                          • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 007CF4DE
                                                          • SetForegroundWindow.USER32(00000000), ref: 007CF4E1
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 007CF4F6
                                                          • keybd_event.USER32(00000012,00000000), ref: 007CF501
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 007CF50B
                                                          • keybd_event.USER32(00000012,00000000), ref: 007CF510
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 007CF519
                                                          • keybd_event.USER32(00000012,00000000), ref: 007CF51E
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 007CF528
                                                          • keybd_event.USER32(00000012,00000000), ref: 007CF52D
                                                          • SetForegroundWindow.USER32(00000000), ref: 007CF530
                                                          • AttachThreadInput.USER32(?,000000FF,00000000), ref: 007CF557
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 4125248594-2988720461
                                                          • Opcode ID: 1d8ae6a31ead2f6ab2fce3aa3e8c2336b705d2c99f2a308cc00ef735f1cb08fb
                                                          • Instruction ID: 69f3638d5fea478e5f55598a24c502b97196621edebff8fa678855974da24aa1
                                                          • Opcode Fuzzy Hash: 1d8ae6a31ead2f6ab2fce3aa3e8c2336b705d2c99f2a308cc00ef735f1cb08fb
                                                          • Instruction Fuzzy Hash: 4F314F71A40218BBEB216FB55C4AFBF7E6DFB44B50F10016AFA01E61D1C7B55D10AAA0
                                                          APIs
                                                            • Part of subcall function 007D16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007D170D
                                                            • Part of subcall function 007D16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007D173A
                                                            • Part of subcall function 007D16C3: GetLastError.KERNEL32 ref: 007D174A
                                                          • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 007D1286
                                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 007D12A8
                                                          • CloseHandle.KERNEL32(?), ref: 007D12B9
                                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 007D12D1
                                                          • GetProcessWindowStation.USER32 ref: 007D12EA
                                                          • SetProcessWindowStation.USER32(00000000), ref: 007D12F4
                                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 007D1310
                                                            • Part of subcall function 007D10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007D11FC), ref: 007D10D4
                                                            • Part of subcall function 007D10BF: CloseHandle.KERNEL32(?,?,007D11FC), ref: 007D10E9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                          • String ID: $default$winsta0
                                                          • API String ID: 22674027-1027155976
                                                          • Opcode ID: a08e57db51ec220ff2b570099100659f9fb5e6792be5b6b8cc55c9f82cafd7dc
                                                          • Instruction ID: 297f7fb7a4028840fbdff9cdf3c998f4e21b46beaaae3a3c84c753fd416772ab
                                                          • Opcode Fuzzy Hash: a08e57db51ec220ff2b570099100659f9fb5e6792be5b6b8cc55c9f82cafd7dc
                                                          • Instruction Fuzzy Hash: 32818BB1A00249BFDF219FA4DC49FEE7BB9FF04704F14422AF910A62A0D7799945CB60
                                                          APIs
                                                            • Part of subcall function 007D10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007D1114
                                                            • Part of subcall function 007D10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,007D0B9B,?,?,?), ref: 007D1120
                                                            • Part of subcall function 007D10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,007D0B9B,?,?,?), ref: 007D112F
                                                            • Part of subcall function 007D10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,007D0B9B,?,?,?), ref: 007D1136
                                                            • Part of subcall function 007D10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007D114D
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 007D0BCC
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 007D0C00
                                                          • GetLengthSid.ADVAPI32(?), ref: 007D0C17
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 007D0C51
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007D0C6D
                                                          • GetLengthSid.ADVAPI32(?), ref: 007D0C84
                                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 007D0C8C
                                                          • HeapAlloc.KERNEL32(00000000), ref: 007D0C93
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 007D0CB4
                                                          • CopySid.ADVAPI32(00000000), ref: 007D0CBB
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 007D0CEA
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007D0D0C
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007D0D1E
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007D0D45
                                                          • HeapFree.KERNEL32(00000000), ref: 007D0D4C
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007D0D55
                                                          • HeapFree.KERNEL32(00000000), ref: 007D0D5C
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007D0D65
                                                          • HeapFree.KERNEL32(00000000), ref: 007D0D6C
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 007D0D78
                                                          • HeapFree.KERNEL32(00000000), ref: 007D0D7F
                                                            • Part of subcall function 007D1193: GetProcessHeap.KERNEL32(00000008,007D0BB1,?,00000000,?,007D0BB1,?), ref: 007D11A1
                                                            • Part of subcall function 007D1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,007D0BB1,?), ref: 007D11A8
                                                            • Part of subcall function 007D1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,007D0BB1,?), ref: 007D11B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                          • String ID:
                                                          • API String ID: 4175595110-0
                                                          • Opcode ID: 2d5b679228e89cade6d17321cc467e6c886d18ad576de5fd01a687ffd638e2f2
                                                          • Instruction ID: 2503730ad2c31942922009e262856142234bf3662b41b7dce6248575a332de88
                                                          • Opcode Fuzzy Hash: 2d5b679228e89cade6d17321cc467e6c886d18ad576de5fd01a687ffd638e2f2
                                                          • Instruction Fuzzy Hash: 2F714C76A0020AAFDF10DFA4DC48FEEBBB9BF05310F144616F915A7291D779A905CBA0
                                                          APIs
                                                          • OpenClipboard.USER32(0080CC08), ref: 007EEB29
                                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 007EEB37
                                                          • GetClipboardData.USER32(0000000D), ref: 007EEB43
                                                          • CloseClipboard.USER32 ref: 007EEB4F
                                                          • GlobalLock.KERNEL32(00000000), ref: 007EEB87
                                                          • CloseClipboard.USER32 ref: 007EEB91
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 007EEBBC
                                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 007EEBC9
                                                          • GetClipboardData.USER32(00000001), ref: 007EEBD1
                                                          • GlobalLock.KERNEL32(00000000), ref: 007EEBE2
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 007EEC22
                                                          • IsClipboardFormatAvailable.USER32(0000000F), ref: 007EEC38
                                                          • GetClipboardData.USER32(0000000F), ref: 007EEC44
                                                          • GlobalLock.KERNEL32(00000000), ref: 007EEC55
                                                          • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 007EEC77
                                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 007EEC94
                                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 007EECD2
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 007EECF3
                                                          • CountClipboardFormats.USER32 ref: 007EED14
                                                          • CloseClipboard.USER32 ref: 007EED59
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                          • String ID:
                                                          • API String ID: 420908878-0
                                                          • Opcode ID: 3c9378e7130fac33c411bcdb8c536647940dfaa68e1115f1d0aa7a696aca7870
                                                          • Instruction ID: 86bc5810da606049dfc1881f6f5a61b1ebcf027cfd13fb521656e6a4c5c17645
                                                          • Opcode Fuzzy Hash: 3c9378e7130fac33c411bcdb8c536647940dfaa68e1115f1d0aa7a696aca7870
                                                          • Instruction Fuzzy Hash: 7461F074205341AFD710EF25DC89F2AB7A4BF88744F148A1DF45A872A2DB39ED05CB62
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 007E69BE
                                                          • FindClose.KERNEL32(00000000), ref: 007E6A12
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 007E6A4E
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 007E6A75
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 007E6AB2
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 007E6ADF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                          • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                          • API String ID: 3830820486-3289030164
                                                          • Opcode ID: 89592b53897ef879106d5f71855e86454a58bdeaa7a8eb451db4d9102b8c639c
                                                          • Instruction ID: 51a7d1fe8ef76495d473138df2853c1cb463a0cc4c07476aa1c5137122db346b
                                                          • Opcode Fuzzy Hash: 89592b53897ef879106d5f71855e86454a58bdeaa7a8eb451db4d9102b8c639c
                                                          • Instruction Fuzzy Hash: 2ED161B2508340AFC714EB64CC85EABB7ECBF99744F04891DF589D6191EB38DA04CB62
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 007E9663
                                                          • GetFileAttributesW.KERNEL32(?), ref: 007E96A1
                                                          • SetFileAttributesW.KERNEL32(?,?), ref: 007E96BB
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 007E96D3
                                                          • FindClose.KERNEL32(00000000), ref: 007E96DE
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 007E96FA
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 007E974A
                                                          • SetCurrentDirectoryW.KERNEL32(00836B7C), ref: 007E9768
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 007E9772
                                                          • FindClose.KERNEL32(00000000), ref: 007E977F
                                                          • FindClose.KERNEL32(00000000), ref: 007E978F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                          • String ID: *.*
                                                          • API String ID: 1409584000-438819550
                                                          • Opcode ID: 763c19ea1f653cc3fe3fbaffa820f38d38b083d2d6df101e382253d96a9721af
                                                          • Instruction ID: cc76a0017aa4ff239f687d1a02a8a4283a05a2b440231b83de08c080f8424143
                                                          • Opcode Fuzzy Hash: 763c19ea1f653cc3fe3fbaffa820f38d38b083d2d6df101e382253d96a9721af
                                                          • Instruction Fuzzy Hash: CC31C233502259AADF20AFB5EC49ADE77ACBF4D360F104166FA15E2191EB38DD448A50
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 007E97BE
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 007E9819
                                                          • FindClose.KERNEL32(00000000), ref: 007E9824
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 007E9840
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 007E9890
                                                          • SetCurrentDirectoryW.KERNEL32(00836B7C), ref: 007E98AE
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 007E98B8
                                                          • FindClose.KERNEL32(00000000), ref: 007E98C5
                                                          • FindClose.KERNEL32(00000000), ref: 007E98D5
                                                            • Part of subcall function 007DDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 007DDB00
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                          • String ID: *.*
                                                          • API String ID: 2640511053-438819550
                                                          • Opcode ID: b5d461451ae65fede9b6ed3f639551b5088f04226188922b7f74601ed8d41c13
                                                          • Instruction ID: 2e932d6af487681699480180278506a32fa1926452efb6610512b24a922a967f
                                                          • Opcode Fuzzy Hash: b5d461451ae65fede9b6ed3f639551b5088f04226188922b7f74601ed8d41c13
                                                          • Instruction Fuzzy Hash: 0231C332501259AADF20AFB5EC48ADE77ACFF4A320F108155EA10E21E1EB39DD458B60
                                                          APIs
                                                            • Part of subcall function 007FC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007FB6AE,?,?), ref: 007FC9B5
                                                            • Part of subcall function 007FC998: _wcslen.LIBCMT ref: 007FC9F1
                                                            • Part of subcall function 007FC998: _wcslen.LIBCMT ref: 007FCA68
                                                            • Part of subcall function 007FC998: _wcslen.LIBCMT ref: 007FCA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007FBF3E
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 007FBFA9
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 007FBFCD
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 007FC02C
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 007FC0E7
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 007FC154
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 007FC1E9
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 007FC23A
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 007FC2E3
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 007FC382
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 007FC38F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                          • String ID:
                                                          • API String ID: 3102970594-0
                                                          • Opcode ID: bed235de4437c7ad076b9c35e003c6d4cef847a85abaa1e69654e17021d04acd
                                                          • Instruction ID: 099db91ab0e01c46b3254c820bfefdb38576e2e09b03fab9c601835e870b87c7
                                                          • Opcode Fuzzy Hash: bed235de4437c7ad076b9c35e003c6d4cef847a85abaa1e69654e17021d04acd
                                                          • Instruction Fuzzy Hash: 48026B70604204DFDB15DF24C985E2ABBE5AF89348F18C49CF94A8B3A2DB35EC45CB52
                                                          APIs
                                                          • GetLocalTime.KERNEL32(?), ref: 007E8257
                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 007E8267
                                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 007E8273
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 007E8310
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 007E8324
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 007E8356
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 007E838C
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 007E8395
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryTime$File$Local$System
                                                          • String ID: *.*
                                                          • API String ID: 1464919966-438819550
                                                          • Opcode ID: 796fdfcff8525e47f78b30f12535556afeb02742fa601c711aaa5094623918a2
                                                          • Instruction ID: fec187d87e2e95275416d4a1a441fde0099fc6c3c242c4aca4187a1f635e769f
                                                          • Opcode Fuzzy Hash: 796fdfcff8525e47f78b30f12535556afeb02742fa601c711aaa5094623918a2
                                                          • Instruction Fuzzy Hash: C26189B25043459FCB10EF64C8459AEB3E8FF89314F04892EF99997251EB39E905CB92
                                                          APIs
                                                            • Part of subcall function 00773AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00773A97,?,?,00772E7F,?,?,?,00000000), ref: 00773AC2
                                                            • Part of subcall function 007DE199: GetFileAttributesW.KERNEL32(?,007DCF95), ref: 007DE19A
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 007DD122
                                                          • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 007DD1DD
                                                          • MoveFileW.KERNEL32(?,?), ref: 007DD1F0
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 007DD20D
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 007DD237
                                                            • Part of subcall function 007DD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,007DD21C,?,?), ref: 007DD2B2
                                                          • FindClose.KERNEL32(00000000,?,?,?), ref: 007DD253
                                                          • FindClose.KERNEL32(00000000), ref: 007DD264
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 1946585618-1173974218
                                                          • Opcode ID: bb72bc138fd33f63f2390399b29dfb2a4293c3d5e9e90df7bc458670f5034659
                                                          • Instruction ID: f3c0802dbcd4b2c42183660b012f3e9a8021277171ae1253e2e093e210712990
                                                          • Opcode Fuzzy Hash: bb72bc138fd33f63f2390399b29dfb2a4293c3d5e9e90df7bc458670f5034659
                                                          • Instruction Fuzzy Hash: BD617A3180110DEACF15EBE0CE969EDB7B5BF55340F208166E40677292EB39AF09CB61
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                          • String ID:
                                                          • API String ID: 1737998785-0
                                                          • Opcode ID: de33e5c5ec4bbdf3f9f2feae6ad852114a9528e9873ed5c9c70c87a214a91c78
                                                          • Instruction ID: e63760534136eb5d7c10ce8a77f65d31d760ff2d90f5f164b6968d3be3c30789
                                                          • Opcode Fuzzy Hash: de33e5c5ec4bbdf3f9f2feae6ad852114a9528e9873ed5c9c70c87a214a91c78
                                                          • Instruction Fuzzy Hash: EB41AD35605651AFE720DF16D888B19BBE1FF49328F14C59DE4298B7A2C73AEC41CB90
                                                          APIs
                                                            • Part of subcall function 007D16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007D170D
                                                            • Part of subcall function 007D16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007D173A
                                                            • Part of subcall function 007D16C3: GetLastError.KERNEL32 ref: 007D174A
                                                          • ExitWindowsEx.USER32(?,00000000), ref: 007DE932
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                          • String ID: $ $@$SeShutdownPrivilege
                                                          • API String ID: 2234035333-3163812486
                                                          • Opcode ID: c4b712ee22ab0e20a2d6c5edd98da93ab36a173f0cfda5cb361b321f8f2771b5
                                                          • Instruction ID: b0d9b5910ddca9bb9106dd8409d7cc0b15386ac5da7363174e82bc49504f7381
                                                          • Opcode Fuzzy Hash: c4b712ee22ab0e20a2d6c5edd98da93ab36a173f0cfda5cb361b321f8f2771b5
                                                          • Instruction Fuzzy Hash: DB014972611211FBEB5537B49C9AFBF72BCAB04740F150923FC13E63D1D6A86C408191
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 007F1276
                                                          • WSAGetLastError.WSOCK32 ref: 007F1283
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 007F12BA
                                                          • WSAGetLastError.WSOCK32 ref: 007F12C5
                                                          • closesocket.WSOCK32(00000000), ref: 007F12F4
                                                          • listen.WSOCK32(00000000,00000005), ref: 007F1303
                                                          • WSAGetLastError.WSOCK32 ref: 007F130D
                                                          • closesocket.WSOCK32(00000000), ref: 007F133C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$closesocket$bindlistensocket
                                                          • String ID:
                                                          • API String ID: 540024437-0
                                                          • Opcode ID: cb63b11330213168565563b9dcdbf3419caee956ef817add763f867068eaf866
                                                          • Instruction ID: 91026d9904a340cfdd18b1ebc3e43969ba2f30b4d2292eb0819f4a6353e38505
                                                          • Opcode Fuzzy Hash: cb63b11330213168565563b9dcdbf3419caee956ef817add763f867068eaf866
                                                          • Instruction Fuzzy Hash: 55417E31A00144DFD710DF68C488B2ABBE6BF4A318F58C198E9569F392C775ED81CBA1
                                                          APIs
                                                            • Part of subcall function 00773AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00773A97,?,?,00772E7F,?,?,?,00000000), ref: 00773AC2
                                                            • Part of subcall function 007DE199: GetFileAttributesW.KERNEL32(?,007DCF95), ref: 007DE19A
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 007DD420
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 007DD470
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 007DD481
                                                          • FindClose.KERNEL32(00000000), ref: 007DD498
                                                          • FindClose.KERNEL32(00000000), ref: 007DD4A1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 2649000838-1173974218
                                                          • Opcode ID: 1a0467ce31bab99a367ebb16e91ecdef9e66d73a4d9d30595f46a79f1bdf572b
                                                          • Instruction ID: 11526f727a4b8e9c22487943f2cf9f4046ed5cc4a2ce84b768f329768eff2cb8
                                                          • Opcode Fuzzy Hash: 1a0467ce31bab99a367ebb16e91ecdef9e66d73a4d9d30595f46a79f1bdf572b
                                                          • Instruction Fuzzy Hash: 98317271008385EBC711EF64C8558AFB7A8BE91344F448A1EF8D552291EB28AE09CB63
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: __floor_pentium4
                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                          • API String ID: 4168288129-2761157908
                                                          • Opcode ID: 33bfe45a3498e2abe06ffe6346a62e5ddeca2353feac05490825f4fac98e2ed1
                                                          • Instruction ID: 32193dfb728ac0464d28c07fa17195057c046f568286918da5913870802bbf65
                                                          • Opcode Fuzzy Hash: 33bfe45a3498e2abe06ffe6346a62e5ddeca2353feac05490825f4fac98e2ed1
                                                          • Instruction Fuzzy Hash: 2FC22B71E046288FDF25CE68DD447EAB7B5EB8A305F1442EAD44DE7241E778AE818F40
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 007E64DC
                                                          • CoInitialize.OLE32(00000000), ref: 007E6639
                                                          • CoCreateInstance.OLE32(0080FCF8,00000000,00000001,0080FB68,?), ref: 007E6650
                                                          • CoUninitialize.OLE32 ref: 007E68D4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 886957087-24824748
                                                          • Opcode ID: 9ee5c1d9e730c36a2b743653336d36c5ab99c959a62dd8825841a13c8eed18f5
                                                          • Instruction ID: c516a20549b97e52e320ab0f182db08301d96a4d530b278f80e35fc5527735a9
                                                          • Opcode Fuzzy Hash: 9ee5c1d9e730c36a2b743653336d36c5ab99c959a62dd8825841a13c8eed18f5
                                                          • Instruction Fuzzy Hash: 1DD16971608341AFC714DF24C885E6BB7E8FF99744F00892DF5998B2A1EB34E905CB92
                                                          APIs
                                                          • GetForegroundWindow.USER32(?,?,00000000), ref: 007F22E8
                                                            • Part of subcall function 007EE4EC: GetWindowRect.USER32(?,?), ref: 007EE504
                                                          • GetDesktopWindow.USER32 ref: 007F2312
                                                          • GetWindowRect.USER32(00000000), ref: 007F2319
                                                          • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 007F2355
                                                          • GetCursorPos.USER32(?), ref: 007F2381
                                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 007F23DF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                          • String ID:
                                                          • API String ID: 2387181109-0
                                                          • Opcode ID: d48e937bc21c9056e9b23e1169a03b07d834be14906dbfe3efe74dc606575858
                                                          • Instruction ID: 7cc106015b81cebd134179840ef682997a91e78b9428a279b81dcc805bf4c97b
                                                          • Opcode Fuzzy Hash: d48e937bc21c9056e9b23e1169a03b07d834be14906dbfe3efe74dc606575858
                                                          • Instruction Fuzzy Hash: 5431D2B25053199FD720DF54C849F6BBBA9FF84314F000A19F58597291D738E909CB92
                                                          APIs
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                          • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 007E9B78
                                                          • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 007E9C8B
                                                            • Part of subcall function 007E3874: GetInputState.USER32 ref: 007E38CB
                                                            • Part of subcall function 007E3874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 007E3966
                                                          • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 007E9BA8
                                                          • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 007E9C75
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                          • String ID: *.*
                                                          • API String ID: 1972594611-438819550
                                                          • Opcode ID: ee5cec09c8726f4fe944aba99259a20445969cd113856f11fc003f2ccd5f9b91
                                                          • Instruction ID: c55e3d559e434c641fd6a5142bdd8580abb56d22fed711d98eabcaf09aba98bd
                                                          • Opcode Fuzzy Hash: ee5cec09c8726f4fe944aba99259a20445969cd113856f11fc003f2ccd5f9b91
                                                          • Instruction Fuzzy Hash: 43419372901249EFCF54EF75C849AEEBBB4FF09350F208155E509A21A1EB389E84CF60
                                                          APIs
                                                            • Part of subcall function 00789BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00789BB2
                                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 00789A4E
                                                          • GetSysColor.USER32(0000000F), ref: 00789B23
                                                          • SetBkColor.GDI32(?,00000000), ref: 00789B36
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$LongProcWindow
                                                          • String ID:
                                                          • API String ID: 3131106179-0
                                                          • Opcode ID: 0c83ffc8de4c5f736a94b6e85e56ae3dddbf25b22987b44d52d18552340eac0d
                                                          • Instruction ID: 0f2ffde5a480ee9936db12ad1da6f424fe3aff49a5132d85cd5e2762690ca30b
                                                          • Opcode Fuzzy Hash: 0c83ffc8de4c5f736a94b6e85e56ae3dddbf25b22987b44d52d18552340eac0d
                                                          • Instruction Fuzzy Hash: 5BA1E970288404BEE72DBA2D8C5DE7B2A9DFB82350B19411DF602D6AD1CE2D9D41C777
                                                          APIs
                                                            • Part of subcall function 007F304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 007F307A
                                                            • Part of subcall function 007F304E: _wcslen.LIBCMT ref: 007F309B
                                                          • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 007F185D
                                                          • WSAGetLastError.WSOCK32 ref: 007F1884
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 007F18DB
                                                          • WSAGetLastError.WSOCK32 ref: 007F18E6
                                                          • closesocket.WSOCK32(00000000), ref: 007F1915
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 1601658205-0
                                                          • Opcode ID: c017e285b6897415edd7fcd5c06ab24b394b0b94d0ebe4984d172c9b7b693877
                                                          • Instruction ID: 13d7210424d786a5be475e111d52e4d1a5427dee88adca2c7ea2b7cfeeb71cda
                                                          • Opcode Fuzzy Hash: c017e285b6897415edd7fcd5c06ab24b394b0b94d0ebe4984d172c9b7b693877
                                                          • Instruction Fuzzy Hash: 1851A171A40200EFDB10AF24C88AF2A77A5AB49758F58C458FA095F383D779AD418BE1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                          • String ID:
                                                          • API String ID: 292994002-0
                                                          • Opcode ID: ffbbd8ea7ff24cf025c27316e5a57a010d0658624eea86f1a27d9a6a1a4855bd
                                                          • Instruction ID: 7df05fd7a84d7583c9196e4129bf13966c1f2054bae0b7cc482aa04c371b4ed0
                                                          • Opcode Fuzzy Hash: ffbbd8ea7ff24cf025c27316e5a57a010d0658624eea86f1a27d9a6a1a4855bd
                                                          • Instruction Fuzzy Hash: 752174317416119FEB618F2ACC88B5A7BA5FF95325F19805CE846CB291CB75DC42CB90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                          • API String ID: 0-1546025612
                                                          • Opcode ID: ce9a5755f9934a1dd6293f1c8c316029e692b9b3b0a8f9cfb2aec64275074357
                                                          • Instruction ID: 7b722643f08cfc26ce529c72a9efd195728d9c774cabfee4f0613edc51f3f499
                                                          • Opcode Fuzzy Hash: ce9a5755f9934a1dd6293f1c8c316029e692b9b3b0a8f9cfb2aec64275074357
                                                          • Instruction Fuzzy Hash: 62A2A170E4021ACBDF64CF58C8447EEB7B1BF54350F2481AAE919A7285EB789D81CF91
                                                          APIs
                                                          • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 007DAAAC
                                                          • SetKeyboardState.USER32(00000080), ref: 007DAAC8
                                                          • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 007DAB36
                                                          • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 007DAB88
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: aa56c107e099f6ca41b2db1c46f926cc68c0ba141bf470c0f1a88421b652c1ba
                                                          • Instruction ID: 088aa0571c0ec065cef3e8054150d1879da7bd5128ff43b07525a2438c9cf0a4
                                                          • Opcode Fuzzy Hash: aa56c107e099f6ca41b2db1c46f926cc68c0ba141bf470c0f1a88421b652c1ba
                                                          • Instruction Fuzzy Hash: C931E5B0A40248BEEF358B648C09BFA7BB6BB45310F14431BF591567E1D37D8982C762
                                                          APIs
                                                          • _free.LIBCMT ref: 007ABB7F
                                                            • Part of subcall function 007A29C8: HeapFree.KERNEL32(00000000,00000000,?,007AD7D1,00000000,00000000,00000000,00000000,?,007AD7F8,00000000,00000007,00000000,?,007ADBF5,00000000), ref: 007A29DE
                                                            • Part of subcall function 007A29C8: GetLastError.KERNEL32(00000000,?,007AD7D1,00000000,00000000,00000000,00000000,?,007AD7F8,00000000,00000007,00000000,?,007ADBF5,00000000,00000000), ref: 007A29F0
                                                          • GetTimeZoneInformation.KERNEL32 ref: 007ABB91
                                                          • WideCharToMultiByte.KERNEL32(00000000,?,0084121C,000000FF,?,0000003F,?,?), ref: 007ABC09
                                                          • WideCharToMultiByte.KERNEL32(00000000,?,00841270,000000FF,?,0000003F,?,?,?,0084121C,000000FF,?,0000003F,?,?), ref: 007ABC36
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                          • String ID:
                                                          • API String ID: 806657224-0
                                                          • Opcode ID: 2814ca734f62c1f956017a42c05fae2f1a16be9ab13fcb83dcda6fe9fe8843c8
                                                          • Instruction ID: e6a0741d947b56d78ad1c102bd8c8f083724ca9b8573ae50002d2860eefd0dc6
                                                          • Opcode Fuzzy Hash: 2814ca734f62c1f956017a42c05fae2f1a16be9ab13fcb83dcda6fe9fe8843c8
                                                          • Instruction Fuzzy Hash: 6E31CF70904215DFCF10DF69DC84829BBB8FF87720B1443AAE020D72A2D7749D80CB60
                                                          APIs
                                                          • InternetReadFile.WININET(?,?,00000400,?), ref: 007ECE89
                                                          • GetLastError.KERNEL32(?,00000000), ref: 007ECEEA
                                                          • SetEvent.KERNEL32(?,?,00000000), ref: 007ECEFE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorEventFileInternetLastRead
                                                          • String ID:
                                                          • API String ID: 234945975-0
                                                          • Opcode ID: 507df9e40709e1cbf1b09d7d1693ac41f540452b1e03ac9232cfae1a0b1bee4b
                                                          • Instruction ID: 88516bd38c96d4f60530aa95eb11f9cb23e188cf147d0a1f475d48a2b75c883c
                                                          • Opcode Fuzzy Hash: 507df9e40709e1cbf1b09d7d1693ac41f540452b1e03ac9232cfae1a0b1bee4b
                                                          • Instruction Fuzzy Hash: 7421EDB5501305EFEB31DFA6C949BAA77F8EB04308F10441EE542D2151E778EE068B60
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 007D82AA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: lstrlen
                                                          • String ID: ($|
                                                          • API String ID: 1659193697-1631851259
                                                          • Opcode ID: df24e07e3f187d93d71178a692b53298b0708f5eac2be7d8c5dc79030ad011bc
                                                          • Instruction ID: 9a394721710f8011ad78773de3f6a096c76015688b208edf407c70a6bdfaca06
                                                          • Opcode Fuzzy Hash: df24e07e3f187d93d71178a692b53298b0708f5eac2be7d8c5dc79030ad011bc
                                                          • Instruction Fuzzy Hash: 4B323474A00605DFCB68CF59C481A6AB7F0FF48720B15C56EE59ADB3A1EB74E981CB40
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 007E5CC1
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 007E5D17
                                                          • FindClose.KERNEL32(?), ref: 007E5D5F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstNext
                                                          • String ID:
                                                          • API String ID: 3541575487-0
                                                          • Opcode ID: d96c498d8ffe2b3421274251442edc167946c21fcb96f50cff313e167a12f410
                                                          • Instruction ID: 35e3e070b59b874784e12679afb33cee646d25d14fec2bb47d3636b4a16518c5
                                                          • Opcode Fuzzy Hash: d96c498d8ffe2b3421274251442edc167946c21fcb96f50cff313e167a12f410
                                                          • Instruction Fuzzy Hash: B351BB34700A45DFC714DF28C898A9AB7E4FF49318F14855DE95A8B3A2CB34EC04CB91
                                                          APIs
                                                          • IsDebuggerPresent.KERNEL32 ref: 007A271A
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 007A2724
                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 007A2731
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                          • String ID:
                                                          • API String ID: 3906539128-0
                                                          • Opcode ID: 2fe815d9ace5485f4db4c568e0b10314b5070eb31e5ebc3e9abfb96127098be5
                                                          • Instruction ID: 88aea5a920ed7fd4dcf9bf7df36171613ebe0f99ccf827d4946cadb20cb82316
                                                          • Opcode Fuzzy Hash: 2fe815d9ace5485f4db4c568e0b10314b5070eb31e5ebc3e9abfb96127098be5
                                                          • Instruction Fuzzy Hash: 8D31B574911218ABCB21DF68DD897DDB7B8BF48310F5042EAE81CA7261E7349F818F85
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 007E51DA
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 007E5238
                                                          • SetErrorMode.KERNEL32(00000000), ref: 007E52A1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID:
                                                          • API String ID: 1682464887-0
                                                          • Opcode ID: eecbe59f8745f6be198b0a71d0a4260cbc43071b882a1b2abb0abdfdbc5f26ef
                                                          • Instruction ID: 19fba6b5f5310e2cabc4c660df82b1e41daa7955fe4480f8dcb78115470dc7ac
                                                          • Opcode Fuzzy Hash: eecbe59f8745f6be198b0a71d0a4260cbc43071b882a1b2abb0abdfdbc5f26ef
                                                          • Instruction Fuzzy Hash: 2E316F75A00518DFDB00DF54D888EADBBB4FF49318F088099E909AB3A2DB75EC55CB90
                                                          APIs
                                                            • Part of subcall function 0078FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00790668
                                                            • Part of subcall function 0078FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00790685
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007D170D
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007D173A
                                                          • GetLastError.KERNEL32 ref: 007D174A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                          • String ID:
                                                          • API String ID: 577356006-0
                                                          • Opcode ID: 1b661a53df130a775b73bb2068fcf5534da728973876c933286d839115ef8876
                                                          • Instruction ID: 9768d3f498b598904d844bc638a89e57c20c6a8933ed48b6c62e7f8233b7e141
                                                          • Opcode Fuzzy Hash: 1b661a53df130a775b73bb2068fcf5534da728973876c933286d839115ef8876
                                                          • Instruction Fuzzy Hash: 1F11CEB2500304FFE718AF64DC8AD6AB7BDFB04724B20852EE45653251EB74FC418B20
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 007DD608
                                                          • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 007DD645
                                                          • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 007DD650
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseControlCreateDeviceFileHandle
                                                          • String ID:
                                                          • API String ID: 33631002-0
                                                          • Opcode ID: c31bfb8189296eefe5013de9839aaf19fe884a1e982656f580255a5d79976d7e
                                                          • Instruction ID: 9ec30f679d8cb9621298e28dbbb4ba91d868d00728c851dd2f971775001fab9a
                                                          • Opcode Fuzzy Hash: c31bfb8189296eefe5013de9839aaf19fe884a1e982656f580255a5d79976d7e
                                                          • Instruction Fuzzy Hash: E8113C75E05228BBDB208F959C45FAFBBBCEB45B50F108156F904E7290D6704A058BA1
                                                          APIs
                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 007D168C
                                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 007D16A1
                                                          • FreeSid.ADVAPI32(?), ref: 007D16B1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                                          • String ID:
                                                          • API String ID: 3429775523-0
                                                          • Opcode ID: 132b976d905c7c7d2de28b71a2b3e0fe06504ee5f7f4b9fff2275ec940592dc8
                                                          • Instruction ID: 7ac602e33bc6fc5038912e592f0ecbd422c98b01465d0e14a7f373b2a0f8a79b
                                                          • Opcode Fuzzy Hash: 132b976d905c7c7d2de28b71a2b3e0fe06504ee5f7f4b9fff2275ec940592dc8
                                                          • Instruction Fuzzy Hash: CDF0F471950309FBEB00DFE49D89AAEBBBCFB08604F504565E501E2191E774AA448A50
                                                          APIs
                                                          • GetUserNameW.ADVAPI32(?,?), ref: 007CD28C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: NameUser
                                                          • String ID: X64
                                                          • API String ID: 2645101109-893830106
                                                          • Opcode ID: 4f2dd2382df50f041a3a1e1a99680fdb7db93652cddee2815ad2e8e8e2993acb
                                                          • Instruction ID: c5a18f7d6e471bae7683406e08003868c1686141ff356db6e313305c3c698532
                                                          • Opcode Fuzzy Hash: 4f2dd2382df50f041a3a1e1a99680fdb7db93652cddee2815ad2e8e8e2993acb
                                                          • Instruction Fuzzy Hash: 1DD0C9B480111DEACBA4DB90DC88DD9B37CBB14305F100255F106A2040D77499498F10
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                          • Instruction ID: 54247c3eaf9ff897dccf8c64f75ce06650fb3a71284fb38b300ef02322b9ca39
                                                          • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                          • Instruction Fuzzy Hash: C9022D72E002199FDF15CFA9D9806ADFBF2EF48314F258169D919E7380D734AA41CB94
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 007E6918
                                                          • FindClose.KERNEL32(00000000), ref: 007E6961
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: b8c400d0cb0d88cebaeaa020ca6bfce528e933ede019c22cff1a236ecabe5e39
                                                          • Instruction ID: 2f0a9e59026c09054a54eb839f3ecd246e0a586f9f04a8f7450144a64e22a9b5
                                                          • Opcode Fuzzy Hash: b8c400d0cb0d88cebaeaa020ca6bfce528e933ede019c22cff1a236ecabe5e39
                                                          • Instruction Fuzzy Hash: E3119071604240DFC710DF2AD488A1ABBE5FF89368F14C69DE4698F6A2C734EC05CB91
                                                          APIs
                                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,007F4891,?,?,00000035,?), ref: 007E37E4
                                                          • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,007F4891,?,?,00000035,?), ref: 007E37F4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorFormatLastMessage
                                                          • String ID:
                                                          • API String ID: 3479602957-0
                                                          • Opcode ID: 9199f3a3c31bd9c28d160604a76cf5ee810e01c33e26d51cbcf038a7792e5e0e
                                                          • Instruction ID: 407a571b32b112123c05e59cbe824d24369b6c49a421917590e97836f4958578
                                                          • Opcode Fuzzy Hash: 9199f3a3c31bd9c28d160604a76cf5ee810e01c33e26d51cbcf038a7792e5e0e
                                                          • Instruction Fuzzy Hash: F7F0EC706062146ADB5017774C4DFEB369DEFC5761F000265F509D3281D5705904C6B0
                                                          APIs
                                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 007DB25D
                                                          • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 007DB270
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: InputSendkeybd_event
                                                          • String ID:
                                                          • API String ID: 3536248340-0
                                                          • Opcode ID: 950d3c8c933447bd2fb7ead48fbf3019a12642244d8639e844c75e69ec4abef6
                                                          • Instruction ID: f50181683ae1a591a897f58c0c2af2c72a7f97155275761762028c4ffcddf641
                                                          • Opcode Fuzzy Hash: 950d3c8c933447bd2fb7ead48fbf3019a12642244d8639e844c75e69ec4abef6
                                                          • Instruction Fuzzy Hash: 17F01D7580424DABDB159FA4C805BAE7BB4FF08305F00810AF955A5191C37996119F94
                                                          APIs
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007D11FC), ref: 007D10D4
                                                          • CloseHandle.KERNEL32(?,?,007D11FC), ref: 007D10E9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                          • String ID:
                                                          • API String ID: 81990902-0
                                                          • Opcode ID: 8e02c5439552a6ddceab26bacc49ce79665ce723cf8d11ab1bea93a08c878b90
                                                          • Instruction ID: adcda808a0847f733c3bb81c1ffd09e3615e639bf269af3cb21a142a445511a4
                                                          • Opcode Fuzzy Hash: 8e02c5439552a6ddceab26bacc49ce79665ce723cf8d11ab1bea93a08c878b90
                                                          • Instruction Fuzzy Hash: 62E04F32014600EEE7252F11FC09E7377A9FB04320B10C92EF5A5805B1DB626CA0DB50
                                                          Strings
                                                          • Variable is not of type 'Object'., xrefs: 007C0C40
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Variable is not of type 'Object'.
                                                          • API String ID: 0-1840281001
                                                          • Opcode ID: 2193dad157f278a7082bcf5bd9904283443fd98e95c993c9185510814a57b031
                                                          • Instruction ID: deebdccae55104350cfb2c0d9393a9ad140829d3c8faaef6c5f3e2bbf2f07a37
                                                          • Opcode Fuzzy Hash: 2193dad157f278a7082bcf5bd9904283443fd98e95c993c9185510814a57b031
                                                          • Instruction Fuzzy Hash: E4328E71A00218DBDF15DF94C885FEDB7B5BF09384F14805DE80AAB292D779AE45CBA0
                                                          APIs
                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,007A6766,?,?,00000008,?,?,007AFEFE,00000000), ref: 007A6998
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionRaise
                                                          • String ID:
                                                          • API String ID: 3997070919-0
                                                          • Opcode ID: b402e8b4dbc5fe782faabee3b668a960aee1296c03cb3398db165650e31b8e23
                                                          • Instruction ID: ff9d3c2095d23d0da3bdf40916cf5af39752f9613b1737ddc635224f258be193
                                                          • Opcode Fuzzy Hash: b402e8b4dbc5fe782faabee3b668a960aee1296c03cb3398db165650e31b8e23
                                                          • Instruction Fuzzy Hash: 62B12B71610608DFD715CF28C48AB657BE0FF86364F29C658E899CF2A2C739E991CB40
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID: 0-3916222277
                                                          • Opcode ID: b0c50d67f4ea1f47d16c4e6cd450b8e51d16f5b259febd754dd60e8656716acf
                                                          • Instruction ID: 6cd5ffb486829c4b9f95af74133d03f9ffa2958cf18072ffae944e25276d10a4
                                                          • Opcode Fuzzy Hash: b0c50d67f4ea1f47d16c4e6cd450b8e51d16f5b259febd754dd60e8656716acf
                                                          • Instruction Fuzzy Hash: 04125071900229DBDB54DF58C881BEEB7B5FF48710F14819AE849EB251EB389E81CB91
                                                          APIs
                                                          • BlockInput.USER32(00000001), ref: 007EEABD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: BlockInput
                                                          • String ID:
                                                          • API String ID: 3456056419-0
                                                          • Opcode ID: 44e1322c73f36061e2ca0c0ee339d5d8c347fdc9f3e4c97136b3a64546e20eed
                                                          • Instruction ID: 74e996d840eb88130fa38242e993d593b01982c045f6910cc197a76ff7a26a7f
                                                          • Opcode Fuzzy Hash: 44e1322c73f36061e2ca0c0ee339d5d8c347fdc9f3e4c97136b3a64546e20eed
                                                          • Instruction Fuzzy Hash: 58E012312002049FC710DF5AD404E9AB7D9AF5D764F00C42AFC49C7251D774A8408B90
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,007903EE), ref: 007909DA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: 0d9421b3012b20b8571bbe58977ab34fe9e7ae95151af2f082218ed29fe4a875
                                                          • Instruction ID: 2867f559ad3347b6e0546ba3bc7d93f374d6d91c4688a7b15db93bd91f62d494
                                                          • Opcode Fuzzy Hash: 0d9421b3012b20b8571bbe58977ab34fe9e7ae95151af2f082218ed29fe4a875
                                                          • Instruction Fuzzy Hash:
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0
                                                          • API String ID: 0-4108050209
                                                          • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                          • Instruction ID: bbc6717c0279f82ae811f8d9ca7b4640c194556818c7da50703440b58bae0c52
                                                          • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                          • Instruction Fuzzy Hash: 4351677163CB059BDF3C8568B89EFBE2399DB12354F180509D886DB382C61DEE42D356
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7a274c278f6aba9a2d4b853ac854f8c58c1b0b6dfb5bef63429d989dcf980782
                                                          • Instruction ID: c22aa643e5bacfa193eff62276908a1fb77ee72892ea52d7ca9058765ab6ddcc
                                                          • Opcode Fuzzy Hash: 7a274c278f6aba9a2d4b853ac854f8c58c1b0b6dfb5bef63429d989dcf980782
                                                          • Instruction Fuzzy Hash: B1322122D29F414DD7279634DC22336A68DAFF73C5F15D737E81AB59AAEB28C4938100
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5256053b0664a88cee0a32f621d63cc6c1ca5eca534bb04926f13aa0bbf63eec
                                                          • Instruction ID: 29ea4fffee971f8fbe7da4bc80971ae97af5c461c628d1c2d294b46dae169347
                                                          • Opcode Fuzzy Hash: 5256053b0664a88cee0a32f621d63cc6c1ca5eca534bb04926f13aa0bbf63eec
                                                          • Instruction Fuzzy Hash: 55320531A001158BDF2ADF28C494F7D7BA1EB45310F28856ED88EDB291E63CDD81DB61
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5654f741648d8b02bbd1b07e5cf9b2704cb4ad89a489f7c1bf46ff9bfe95b90f
                                                          • Instruction ID: f564e91a36d22469990647e63ff1efdcf5c3fbb9776e140e6d7fd4cc90b3c276
                                                          • Opcode Fuzzy Hash: 5654f741648d8b02bbd1b07e5cf9b2704cb4ad89a489f7c1bf46ff9bfe95b90f
                                                          • Instruction Fuzzy Hash: 7222AFB0A04609DFDF14DF68D885BEEB7F5FF48344F148529E816A7291EB3AA910CB50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 407f6cc3f40fe7b5a7a6bd3c0fb5c08e66364043b1c25d48f8866d8833a3307f
                                                          • Instruction ID: e2518ee70925ade70c242c21e589bcdc286d7220707325bba3c1be7675b8aeb3
                                                          • Opcode Fuzzy Hash: 407f6cc3f40fe7b5a7a6bd3c0fb5c08e66364043b1c25d48f8866d8833a3307f
                                                          • Instruction Fuzzy Hash: 2F02A5B1A00105EBDF04DF64D885BEEB7B5FF44340F11C569E91A9B391EB39AA20CB91
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5db021306606ce5d0407dca5239d6c589d85dd3078a5d4b93b8e2d1a3b3cc574
                                                          • Instruction ID: 61073412042a7dcf9ea33fbcc705d75f0f1bf5343df2ecee34581cd3a99a5507
                                                          • Opcode Fuzzy Hash: 5db021306606ce5d0407dca5239d6c589d85dd3078a5d4b93b8e2d1a3b3cc574
                                                          • Instruction Fuzzy Hash: D6B1E220D2AF414DD62396399831336FA5CBFBB6D5F51D71BFC2674E22EB2286834240
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                          • Instruction ID: bae471f7b23c86590c4599ef9b8c61b2a467e60d690e75497a711415ec86848b
                                                          • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                          • Instruction Fuzzy Hash: F69167722090E34ADF2D463AA57403DFFE15A523B239A079DD4F2CA1C5EE28D974D620
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                          • Instruction ID: 43c517424b5e9dc2af918973723e0c6d5d7b452cea85588fb8c7f406f8da169e
                                                          • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                          • Instruction Fuzzy Hash: 8E91A7722090E71ADF6D523D943403EFFE25A923A131A079DD4F2CB1C6EE28D975E620
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                          • Instruction ID: 67c05da60618c2a8819f536cc7e8d3b8c96ee1106dc302923987b0de03127d8e
                                                          • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                          • Instruction Fuzzy Hash: D69145722090E34ADF2D467AA57403DFFE19A923B239A479ED4F2CA1C1FD18D974D620
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e878ff7ea552e4f3a6ad2fb2728ddd596c7592c16a7059b5417c39ae22242617
                                                          • Instruction ID: 0cb573845e6bdb3e4b02bcc08c2bd3de7182cbf8e5f2dc9cc0f17d4253bdbea7
                                                          • Opcode Fuzzy Hash: e878ff7ea552e4f3a6ad2fb2728ddd596c7592c16a7059b5417c39ae22242617
                                                          • Instruction Fuzzy Hash: 6B615AB123874996DE3C9A2CBC99BBE2399DF42700F14491EE843DB291D61DDE42C366
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 21d1cb0ba5612b95c97a191729363db86f2a10cfff42c09ee167d0e4acf5dcc9
                                                          • Instruction ID: bc025f1421aa522eba2931eba4b6303f3bb61638263d75d54842119dd10d4196
                                                          • Opcode Fuzzy Hash: 21d1cb0ba5612b95c97a191729363db86f2a10cfff42c09ee167d0e4acf5dcc9
                                                          • Instruction Fuzzy Hash: 8261697173870997DE3C8A28B896BBF2398EF42704F140959E942DF281DA1EAD42C356
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                          • Instruction ID: 7dd0b8290f7901e23f04b3e0d017817e44dc13fd5e36adb60443b68bbc2f87d8
                                                          • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                          • Instruction Fuzzy Hash: C08175726090E309DF6D827A953443EFFE15A923B139A079DD4F2CB1C1EE28D574E620
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0ea759e5e20309b77f83167937538d89e78c7f138210c37d98eb0e7ce2865dd3
                                                          • Instruction ID: a64c7e88e21904419815aad5a560ceb8907c9396121028336d8d5e71c4f9be7d
                                                          • Opcode Fuzzy Hash: 0ea759e5e20309b77f83167937538d89e78c7f138210c37d98eb0e7ce2865dd3
                                                          • Instruction Fuzzy Hash: 3321A8326216558BDB28CF79C81267A73E9B764310F55862EE4A7C37D1DE39A904CB80
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 007F2B30
                                                          • DeleteObject.GDI32(00000000), ref: 007F2B43
                                                          • DestroyWindow.USER32 ref: 007F2B52
                                                          • GetDesktopWindow.USER32 ref: 007F2B6D
                                                          • GetWindowRect.USER32(00000000), ref: 007F2B74
                                                          • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 007F2CA3
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 007F2CB1
                                                          • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007F2CF8
                                                          • GetClientRect.USER32(00000000,?), ref: 007F2D04
                                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 007F2D40
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007F2D62
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007F2D75
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007F2D80
                                                          • GlobalLock.KERNEL32(00000000), ref: 007F2D89
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007F2D98
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 007F2DA1
                                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007F2DA8
                                                          • GlobalFree.KERNEL32(00000000), ref: 007F2DB3
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007F2DC5
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,0080FC38,00000000), ref: 007F2DDB
                                                          • GlobalFree.KERNEL32(00000000), ref: 007F2DEB
                                                          • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 007F2E11
                                                          • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 007F2E30
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007F2E52
                                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007F303F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                          • String ID: $AutoIt v3$DISPLAY$static
                                                          • API String ID: 2211948467-2373415609
                                                          • Opcode ID: c39ad04bca326d5105c9ba4d78efadcb4ca7fde5d8e88ebc5da9d321ee0b4f55
                                                          • Instruction ID: 35a2e150b449eacb6cc4e1921681956e93e9c60fd27873c79a97a7bdccca3a53
                                                          • Opcode Fuzzy Hash: c39ad04bca326d5105c9ba4d78efadcb4ca7fde5d8e88ebc5da9d321ee0b4f55
                                                          • Instruction Fuzzy Hash: 52026C75500208EFDB14DFA4CC89EAE7BB9FF49714F108658F915AB2A1DB78AD01CB60
                                                          APIs
                                                          • SetTextColor.GDI32(?,00000000), ref: 0080712F
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00807160
                                                          • GetSysColor.USER32(0000000F), ref: 0080716C
                                                          • SetBkColor.GDI32(?,000000FF), ref: 00807186
                                                          • SelectObject.GDI32(?,?), ref: 00807195
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 008071C0
                                                          • GetSysColor.USER32(00000010), ref: 008071C8
                                                          • CreateSolidBrush.GDI32(00000000), ref: 008071CF
                                                          • FrameRect.USER32(?,?,00000000), ref: 008071DE
                                                          • DeleteObject.GDI32(00000000), ref: 008071E5
                                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 00807230
                                                          • FillRect.USER32(?,?,?), ref: 00807262
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00807284
                                                            • Part of subcall function 008073E8: GetSysColor.USER32(00000012), ref: 00807421
                                                            • Part of subcall function 008073E8: SetTextColor.GDI32(?,?), ref: 00807425
                                                            • Part of subcall function 008073E8: GetSysColorBrush.USER32(0000000F), ref: 0080743B
                                                            • Part of subcall function 008073E8: GetSysColor.USER32(0000000F), ref: 00807446
                                                            • Part of subcall function 008073E8: GetSysColor.USER32(00000011), ref: 00807463
                                                            • Part of subcall function 008073E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00807471
                                                            • Part of subcall function 008073E8: SelectObject.GDI32(?,00000000), ref: 00807482
                                                            • Part of subcall function 008073E8: SetBkColor.GDI32(?,00000000), ref: 0080748B
                                                            • Part of subcall function 008073E8: SelectObject.GDI32(?,?), ref: 00807498
                                                            • Part of subcall function 008073E8: InflateRect.USER32(?,000000FF,000000FF), ref: 008074B7
                                                            • Part of subcall function 008073E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008074CE
                                                            • Part of subcall function 008073E8: GetWindowLongW.USER32(00000000,000000F0), ref: 008074DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                          • String ID:
                                                          • API String ID: 4124339563-0
                                                          • Opcode ID: 10867c618a9724f77130ed4e358c1f2e0940a5cd9040a69085e2ec9ee31db803
                                                          • Instruction ID: 5b588643880dbd92201986937914fbb35878da46059bfd83af5b6c87c0735079
                                                          • Opcode Fuzzy Hash: 10867c618a9724f77130ed4e358c1f2e0940a5cd9040a69085e2ec9ee31db803
                                                          • Instruction Fuzzy Hash: 53A19F72408301AFDB919F64DC48E6BBBA9FF89320F100B19F962D61E1D771E944CB91
                                                          APIs
                                                          • DestroyWindow.USER32(?,?), ref: 00788E14
                                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 007C6AC5
                                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 007C6AFE
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 007C6F43
                                                            • Part of subcall function 00788F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00788BE8,?,00000000,?,?,?,?,00788BBA,00000000,?), ref: 00788FC5
                                                          • SendMessageW.USER32(?,00001053), ref: 007C6F7F
                                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 007C6F96
                                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 007C6FAC
                                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 007C6FB7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                          • String ID: 0
                                                          • API String ID: 2760611726-4108050209
                                                          • Opcode ID: 66cf42454b1fae0c2c24195d5e07ad61c2c49e19190b33ed7a18875f5d9441c1
                                                          • Instruction ID: 97424c2011703f250fe9d0bf908cb886a9c7ac78c14adc40cb6908c11cb57a9a
                                                          • Opcode Fuzzy Hash: 66cf42454b1fae0c2c24195d5e07ad61c2c49e19190b33ed7a18875f5d9441c1
                                                          • Instruction Fuzzy Hash: E012AD34204201EFDB65DF24C888FA5BBE5FB49300F54456DF5958B261CB39EC92DB92
                                                          APIs
                                                          • DestroyWindow.USER32(00000000), ref: 007F273E
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 007F286A
                                                          • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 007F28A9
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 007F28B9
                                                          • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 007F2900
                                                          • GetClientRect.USER32(00000000,?), ref: 007F290C
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 007F2955
                                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 007F2964
                                                          • GetStockObject.GDI32(00000011), ref: 007F2974
                                                          • SelectObject.GDI32(00000000,00000000), ref: 007F2978
                                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 007F2988
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007F2991
                                                          • DeleteDC.GDI32(00000000), ref: 007F299A
                                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 007F29C6
                                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 007F29DD
                                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 007F2A1D
                                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 007F2A31
                                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 007F2A42
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 007F2A77
                                                          • GetStockObject.GDI32(00000011), ref: 007F2A82
                                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 007F2A8D
                                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 007F2A97
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                          • API String ID: 2910397461-517079104
                                                          • Opcode ID: 280e1a9f143677348e543e0f297af71bee70b016b7f9e9201064718ae5b10946
                                                          • Instruction ID: 66fdf088174a9eb64b21e2adaee694abf0867a85c05eaa3550820dfb61edc920
                                                          • Opcode Fuzzy Hash: 280e1a9f143677348e543e0f297af71bee70b016b7f9e9201064718ae5b10946
                                                          • Instruction Fuzzy Hash: C6B15D75A40209AFEB14DF68CC49FAE7BA9FB08714F108214FA14E7291D778ED41CBA0
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 007E4AED
                                                          • GetDriveTypeW.KERNEL32(?,0080CB68,?,\\.\,0080CC08), ref: 007E4BCA
                                                          • SetErrorMode.KERNEL32(00000000,0080CB68,?,\\.\,0080CC08), ref: 007E4D36
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DriveType
                                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                          • API String ID: 2907320926-4222207086
                                                          • Opcode ID: 5ff293b4774a9ec60ecd7dbe1af2789cb8ee6ee8983fd6e346330a23cc0b9473
                                                          • Instruction ID: 12d63bda0b6af932f943cb2967600e631384710c7bd24221456a2c5c50de8647
                                                          • Opcode Fuzzy Hash: 5ff293b4774a9ec60ecd7dbe1af2789cb8ee6ee8983fd6e346330a23cc0b9473
                                                          • Instruction Fuzzy Hash: 48619030606145EBCB14DF29C99596877F0FB48344B348415E80AEB7A1EB2EED61DBA1
                                                          APIs
                                                          • GetSysColor.USER32(00000012), ref: 00807421
                                                          • SetTextColor.GDI32(?,?), ref: 00807425
                                                          • GetSysColorBrush.USER32(0000000F), ref: 0080743B
                                                          • GetSysColor.USER32(0000000F), ref: 00807446
                                                          • CreateSolidBrush.GDI32(?), ref: 0080744B
                                                          • GetSysColor.USER32(00000011), ref: 00807463
                                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00807471
                                                          • SelectObject.GDI32(?,00000000), ref: 00807482
                                                          • SetBkColor.GDI32(?,00000000), ref: 0080748B
                                                          • SelectObject.GDI32(?,?), ref: 00807498
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 008074B7
                                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008074CE
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 008074DB
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0080752A
                                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00807554
                                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 00807572
                                                          • DrawFocusRect.USER32(?,?), ref: 0080757D
                                                          • GetSysColor.USER32(00000011), ref: 0080758E
                                                          • SetTextColor.GDI32(?,00000000), ref: 00807596
                                                          • DrawTextW.USER32(?,008070F5,000000FF,?,00000000), ref: 008075A8
                                                          • SelectObject.GDI32(?,?), ref: 008075BF
                                                          • DeleteObject.GDI32(?), ref: 008075CA
                                                          • SelectObject.GDI32(?,?), ref: 008075D0
                                                          • DeleteObject.GDI32(?), ref: 008075D5
                                                          • SetTextColor.GDI32(?,?), ref: 008075DB
                                                          • SetBkColor.GDI32(?,?), ref: 008075E5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 1996641542-0
                                                          • Opcode ID: cd426a89fd19bbc74a330aca215135180c50970c71e95458e728340c3540d7fb
                                                          • Instruction ID: 57e34eb87f5cadc776367206afbc66a490d994367961e4114a4a1192f1ef62a9
                                                          • Opcode Fuzzy Hash: cd426a89fd19bbc74a330aca215135180c50970c71e95458e728340c3540d7fb
                                                          • Instruction Fuzzy Hash: C2616A76D00218AFDF419FA4DC49AEEBFB9FB09320F104215F911AB2E1D775A940CB90
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00801128
                                                          • GetDesktopWindow.USER32 ref: 0080113D
                                                          • GetWindowRect.USER32(00000000), ref: 00801144
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00801199
                                                          • DestroyWindow.USER32(?), ref: 008011B9
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 008011ED
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0080120B
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0080121D
                                                          • SendMessageW.USER32(00000000,00000421,?,?), ref: 00801232
                                                          • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00801245
                                                          • IsWindowVisible.USER32(00000000), ref: 008012A1
                                                          • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 008012BC
                                                          • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 008012D0
                                                          • GetWindowRect.USER32(00000000,?), ref: 008012E8
                                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 0080130E
                                                          • GetMonitorInfoW.USER32(00000000,?), ref: 00801328
                                                          • CopyRect.USER32(?,?), ref: 0080133F
                                                          • SendMessageW.USER32(00000000,00000412,00000000), ref: 008013AA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                          • String ID: ($0$tooltips_class32
                                                          • API String ID: 698492251-4156429822
                                                          • Opcode ID: 84c5f7382b1683a4cad4fd94419c82cb738b9ff2360b3ef60ba2d82cbb0bd49b
                                                          • Instruction ID: 3e839ffb404641be33d3131fbd47f3945fb93d086afd31b731b8d07156e46486
                                                          • Opcode Fuzzy Hash: 84c5f7382b1683a4cad4fd94419c82cb738b9ff2360b3ef60ba2d82cbb0bd49b
                                                          • Instruction Fuzzy Hash: 63B15971604341AFDB94DF64C888B6ABBE4FF88754F00891CF999DB2A1C771E844CB92
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00788968
                                                          • GetSystemMetrics.USER32(00000007), ref: 00788970
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0078899B
                                                          • GetSystemMetrics.USER32(00000008), ref: 007889A3
                                                          • GetSystemMetrics.USER32(00000004), ref: 007889C8
                                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 007889E5
                                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 007889F5
                                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00788A28
                                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00788A3C
                                                          • GetClientRect.USER32(00000000,000000FF), ref: 00788A5A
                                                          • GetStockObject.GDI32(00000011), ref: 00788A76
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00788A81
                                                            • Part of subcall function 0078912D: GetCursorPos.USER32(?), ref: 00789141
                                                            • Part of subcall function 0078912D: ScreenToClient.USER32(00000000,?), ref: 0078915E
                                                            • Part of subcall function 0078912D: GetAsyncKeyState.USER32(00000001), ref: 00789183
                                                            • Part of subcall function 0078912D: GetAsyncKeyState.USER32(00000002), ref: 0078919D
                                                          • SetTimer.USER32(00000000,00000000,00000028,007890FC), ref: 00788AA8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                          • String ID: AutoIt v3 GUI
                                                          • API String ID: 1458621304-248962490
                                                          • Opcode ID: 36e30e181e56dfe98fa13edcd6db07132933d610a7c6145df4718db5b38f20ba
                                                          • Instruction ID: 3b10b8045955d7166ac45249b7cad169c65746cf4ab8eb3263a38b0a53a20adf
                                                          • Opcode Fuzzy Hash: 36e30e181e56dfe98fa13edcd6db07132933d610a7c6145df4718db5b38f20ba
                                                          • Instruction Fuzzy Hash: 19B14C75A40209DFDF54EFA8CC89BAE7BB5FB48314F104229FA15A7290DB78A841CB51
                                                          APIs
                                                            • Part of subcall function 007D10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007D1114
                                                            • Part of subcall function 007D10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,007D0B9B,?,?,?), ref: 007D1120
                                                            • Part of subcall function 007D10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,007D0B9B,?,?,?), ref: 007D112F
                                                            • Part of subcall function 007D10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,007D0B9B,?,?,?), ref: 007D1136
                                                            • Part of subcall function 007D10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007D114D
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 007D0DF5
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 007D0E29
                                                          • GetLengthSid.ADVAPI32(?), ref: 007D0E40
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 007D0E7A
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007D0E96
                                                          • GetLengthSid.ADVAPI32(?), ref: 007D0EAD
                                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 007D0EB5
                                                          • HeapAlloc.KERNEL32(00000000), ref: 007D0EBC
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 007D0EDD
                                                          • CopySid.ADVAPI32(00000000), ref: 007D0EE4
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 007D0F13
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007D0F35
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007D0F47
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007D0F6E
                                                          • HeapFree.KERNEL32(00000000), ref: 007D0F75
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007D0F7E
                                                          • HeapFree.KERNEL32(00000000), ref: 007D0F85
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007D0F8E
                                                          • HeapFree.KERNEL32(00000000), ref: 007D0F95
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 007D0FA1
                                                          • HeapFree.KERNEL32(00000000), ref: 007D0FA8
                                                            • Part of subcall function 007D1193: GetProcessHeap.KERNEL32(00000008,007D0BB1,?,00000000,?,007D0BB1,?), ref: 007D11A1
                                                            • Part of subcall function 007D1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,007D0BB1,?), ref: 007D11A8
                                                            • Part of subcall function 007D1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,007D0BB1,?), ref: 007D11B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                          • String ID:
                                                          • API String ID: 4175595110-0
                                                          • Opcode ID: 7068d5ce7a680f29f5d1bce46414f79334c44f7a9b12e8a5a72f51412f40348e
                                                          • Instruction ID: ea6f97fd91a3e65173850e4d37a45e2d15176cdaf7ba0c73c06b97f63251abe0
                                                          • Opcode Fuzzy Hash: 7068d5ce7a680f29f5d1bce46414f79334c44f7a9b12e8a5a72f51412f40348e
                                                          • Instruction Fuzzy Hash: FD715C7290020AEFDF209FA5DC48FEEBBB8BF04310F144216F959E6291D7759A05CBA0
                                                          APIs
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007FC4BD
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,0080CC08,00000000,?,00000000,?,?), ref: 007FC544
                                                          • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 007FC5A4
                                                          • _wcslen.LIBCMT ref: 007FC5F4
                                                          • _wcslen.LIBCMT ref: 007FC66F
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 007FC6B2
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 007FC7C1
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 007FC84D
                                                          • RegCloseKey.ADVAPI32(?), ref: 007FC881
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 007FC88E
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 007FC960
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                          • API String ID: 9721498-966354055
                                                          • Opcode ID: 439b87d6c5499ee1d6bc4fb790c807d9dfb675d4a9a4e2f3a47da4b927d2c65b
                                                          • Instruction ID: 3a7e788c19517eb1a8289c5f9170a150c551bca6f1724d8e96dc6f597e4e7115
                                                          • Opcode Fuzzy Hash: 439b87d6c5499ee1d6bc4fb790c807d9dfb675d4a9a4e2f3a47da4b927d2c65b
                                                          • Instruction Fuzzy Hash: E8126735204205DFDB15DF24C985A2AB7E5FF88754F14889CF98A9B3A2DB39EC41CB81
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 008009C6
                                                          • _wcslen.LIBCMT ref: 00800A01
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00800A54
                                                          • _wcslen.LIBCMT ref: 00800A8A
                                                          • _wcslen.LIBCMT ref: 00800B06
                                                          • _wcslen.LIBCMT ref: 00800B81
                                                            • Part of subcall function 0078F9F2: _wcslen.LIBCMT ref: 0078F9FD
                                                            • Part of subcall function 007D2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007D2BFA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                          • API String ID: 1103490817-4258414348
                                                          • Opcode ID: e2bf9d367c66704325e0002503f68f77a609ac8f6fe86c021bd13bdca1b4a108
                                                          • Instruction ID: a23d0117675603bb69b19a54bc65792c7bdddbd5987710b37f089e080e44a49f
                                                          • Opcode Fuzzy Hash: e2bf9d367c66704325e0002503f68f77a609ac8f6fe86c021bd13bdca1b4a108
                                                          • Instruction Fuzzy Hash: 76E156312087019FCB54DF24C850A2AB7E1FF99358F14895DE89A9B3A2DB34ED46CB91
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                          • API String ID: 1256254125-909552448
                                                          • Opcode ID: cf90f65d624dcc8f04d9d2176dc79da4c3ba65a93b8f3256e8932df5c123546b
                                                          • Instruction ID: bc3f31adf92fa87f1ef56f6b62b2eb8d9630760c887dde9f381cde98f29fd354
                                                          • Opcode Fuzzy Hash: cf90f65d624dcc8f04d9d2176dc79da4c3ba65a93b8f3256e8932df5c123546b
                                                          • Instruction Fuzzy Hash: EC71D57260052E8BCF22DE7CCE515BA3391AFA0764F254524FA66D7384E63DED45C3A0
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 0080835A
                                                          • _wcslen.LIBCMT ref: 0080836E
                                                          • _wcslen.LIBCMT ref: 00808391
                                                          • _wcslen.LIBCMT ref: 008083B4
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 008083F2
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,0080361A,?), ref: 0080844E
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00808487
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 008084CA
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00808501
                                                          • FreeLibrary.KERNEL32(?), ref: 0080850D
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0080851D
                                                          • DestroyIcon.USER32(?), ref: 0080852C
                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00808549
                                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00808555
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                          • String ID: .dll$.exe$.icl
                                                          • API String ID: 799131459-1154884017
                                                          • Opcode ID: 94c98fa531935311e776455c8d626348c95e68aa574f25919906cc86d51d2e26
                                                          • Instruction ID: 1a01a232b516ac254929101abcd60dc5e8e113d23f317a133f3486ad770b01c6
                                                          • Opcode Fuzzy Hash: 94c98fa531935311e776455c8d626348c95e68aa574f25919906cc86d51d2e26
                                                          • Instruction Fuzzy Hash: 9561F071500619FEEB64CF64DC85FBE77A8FB08B21F104609F855E61D1DB78A980CBA0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                          • API String ID: 0-1645009161
                                                          • Opcode ID: 009af28bd7ab9484468a1c2346b9f268df77f3ec11dbffe07e1409ff592228aa
                                                          • Instruction ID: d826c952a40948d24d38808b124c27bb937b2f2f58018de56f22452bdecf56b6
                                                          • Opcode Fuzzy Hash: 009af28bd7ab9484468a1c2346b9f268df77f3ec11dbffe07e1409ff592228aa
                                                          • Instruction Fuzzy Hash: 2481E471644209FBDF29AF64DC46FAE37A8BF15340F008024F918AA292EB7CD911C7E1
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?), ref: 007E3EF8
                                                          • _wcslen.LIBCMT ref: 007E3F03
                                                          • _wcslen.LIBCMT ref: 007E3F5A
                                                          • _wcslen.LIBCMT ref: 007E3F98
                                                          • GetDriveTypeW.KERNEL32(?), ref: 007E3FD6
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007E401E
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007E4059
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007E4087
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                          • API String ID: 1839972693-4113822522
                                                          • Opcode ID: f4d95bf821a9c257e0705ff0972520dc6fcbfc8e39a57ed7c1a2d8c4fef8b9e2
                                                          • Instruction ID: 237aba4bdee1c45a734d0d8e735214e3ae92942b2b8dae3b53ddcb76d9d0a0ff
                                                          • Opcode Fuzzy Hash: f4d95bf821a9c257e0705ff0972520dc6fcbfc8e39a57ed7c1a2d8c4fef8b9e2
                                                          • Instruction Fuzzy Hash: EF71E3326042019FCB10EF29C88586AB7F4FF987A4F10892DF59997251EB38DE46CB91
                                                          APIs
                                                          • LoadIconW.USER32(00000063), ref: 007D5A2E
                                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 007D5A40
                                                          • SetWindowTextW.USER32(?,?), ref: 007D5A57
                                                          • GetDlgItem.USER32(?,000003EA), ref: 007D5A6C
                                                          • SetWindowTextW.USER32(00000000,?), ref: 007D5A72
                                                          • GetDlgItem.USER32(?,000003E9), ref: 007D5A82
                                                          • SetWindowTextW.USER32(00000000,?), ref: 007D5A88
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 007D5AA9
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 007D5AC3
                                                          • GetWindowRect.USER32(?,?), ref: 007D5ACC
                                                          • _wcslen.LIBCMT ref: 007D5B33
                                                          • SetWindowTextW.USER32(?,?), ref: 007D5B6F
                                                          • GetDesktopWindow.USER32 ref: 007D5B75
                                                          • GetWindowRect.USER32(00000000), ref: 007D5B7C
                                                          • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 007D5BD3
                                                          • GetClientRect.USER32(?,?), ref: 007D5BE0
                                                          • PostMessageW.USER32(?,00000005,00000000,?), ref: 007D5C05
                                                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 007D5C2F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                          • String ID:
                                                          • API String ID: 895679908-0
                                                          • Opcode ID: c7c8c065dbc99b128ef91fbc2b9679ea2483314c2c84ed6c3e7846a90f53fc40
                                                          • Instruction ID: 1d1713aa2991e3c29302ff7c85f70c03709fef76ccf2cb521a168419a7041bdf
                                                          • Opcode Fuzzy Hash: c7c8c065dbc99b128ef91fbc2b9679ea2483314c2c84ed6c3e7846a90f53fc40
                                                          • Instruction Fuzzy Hash: D0716F71900B05EFDB20DFA8CE85A6EBBF5FF48704F10461AE552A26A0D779E944CB50
                                                          APIs
                                                          • LoadCursorW.USER32(00000000,00007F89), ref: 007EFE27
                                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 007EFE32
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 007EFE3D
                                                          • LoadCursorW.USER32(00000000,00007F03), ref: 007EFE48
                                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 007EFE53
                                                          • LoadCursorW.USER32(00000000,00007F01), ref: 007EFE5E
                                                          • LoadCursorW.USER32(00000000,00007F81), ref: 007EFE69
                                                          • LoadCursorW.USER32(00000000,00007F88), ref: 007EFE74
                                                          • LoadCursorW.USER32(00000000,00007F80), ref: 007EFE7F
                                                          • LoadCursorW.USER32(00000000,00007F86), ref: 007EFE8A
                                                          • LoadCursorW.USER32(00000000,00007F83), ref: 007EFE95
                                                          • LoadCursorW.USER32(00000000,00007F85), ref: 007EFEA0
                                                          • LoadCursorW.USER32(00000000,00007F82), ref: 007EFEAB
                                                          • LoadCursorW.USER32(00000000,00007F84), ref: 007EFEB6
                                                          • LoadCursorW.USER32(00000000,00007F04), ref: 007EFEC1
                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 007EFECC
                                                          • GetCursorInfo.USER32(?), ref: 007EFEDC
                                                          • GetLastError.KERNEL32 ref: 007EFF1E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Cursor$Load$ErrorInfoLast
                                                          • String ID:
                                                          • API String ID: 3215588206-0
                                                          • Opcode ID: d609facd195119bba317d9e3e507b93e2bc1c455761e4b6293affe9219430db8
                                                          • Instruction ID: 2b86fe2c53827a32d778f15a4a12eb6644c9cf336f14914cb82588a69dd0368a
                                                          • Opcode Fuzzy Hash: d609facd195119bba317d9e3e507b93e2bc1c455761e4b6293affe9219430db8
                                                          • Instruction Fuzzy Hash: E14154B0D05359AADB109FBA8C89C5EBFE8FF08354B50852AF11DE7681DB789901CE91
                                                          APIs
                                                          • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 007900C6
                                                            • Part of subcall function 007900ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0084070C,00000FA0,FA61939F,?,?,?,?,007B23B3,000000FF), ref: 0079011C
                                                            • Part of subcall function 007900ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,007B23B3,000000FF), ref: 00790127
                                                            • Part of subcall function 007900ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,007B23B3,000000FF), ref: 00790138
                                                            • Part of subcall function 007900ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0079014E
                                                            • Part of subcall function 007900ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0079015C
                                                            • Part of subcall function 007900ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0079016A
                                                            • Part of subcall function 007900ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00790195
                                                            • Part of subcall function 007900ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 007901A0
                                                          • ___scrt_fastfail.LIBCMT ref: 007900E7
                                                            • Part of subcall function 007900A3: __onexit.LIBCMT ref: 007900A9
                                                          Strings
                                                          • InitializeConditionVariable, xrefs: 00790148
                                                          • SleepConditionVariableCS, xrefs: 00790154
                                                          • kernel32.dll, xrefs: 00790133
                                                          • WakeAllConditionVariable, xrefs: 00790162
                                                          • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00790122
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                          • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                          • API String ID: 66158676-1714406822
                                                          • Opcode ID: a7f266b29d7c00da593ff616bdeaa2aac62e805ae9875c2a28cb25b2e72d2112
                                                          • Instruction ID: d0285a3fe0daee7ce4ca46afb4bc6c188f7931314454ce82a253c043b04c9fa8
                                                          • Opcode Fuzzy Hash: a7f266b29d7c00da593ff616bdeaa2aac62e805ae9875c2a28cb25b2e72d2112
                                                          • Instruction Fuzzy Hash: 7921D732695714AFEB606FA4BC09B6E37D8FB05B51F00422AF901E37D2DB7C98008AD1
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                          • API String ID: 176396367-1603158881
                                                          • Opcode ID: f270be257d42022a9c9011a589b04f05c82e6cf98a21025433b37e2c2cd09a31
                                                          • Instruction ID: f7a407bfde89a4bb3273f57577267a572819ba8674e8e71df416705c5ba2de7a
                                                          • Opcode Fuzzy Hash: f270be257d42022a9c9011a589b04f05c82e6cf98a21025433b37e2c2cd09a31
                                                          • Instruction Fuzzy Hash: FAE1D232A00516EACF149FB8C855AEDFBB0BF54750F14821AE556F7340DB38AE4587A1
                                                          APIs
                                                          • CharLowerBuffW.USER32(00000000,00000000,0080CC08), ref: 007E4527
                                                          • _wcslen.LIBCMT ref: 007E453B
                                                          • _wcslen.LIBCMT ref: 007E4599
                                                          • _wcslen.LIBCMT ref: 007E45F4
                                                          • _wcslen.LIBCMT ref: 007E463F
                                                          • _wcslen.LIBCMT ref: 007E46A7
                                                            • Part of subcall function 0078F9F2: _wcslen.LIBCMT ref: 0078F9FD
                                                          • GetDriveTypeW.KERNEL32(?,00836BF0,00000061), ref: 007E4743
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharDriveLowerType
                                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                          • API String ID: 2055661098-1000479233
                                                          • Opcode ID: 9bd89e677aa26ee8bfa3f908eb9da445b79f507721883a2ab04f462f8f52f68e
                                                          • Instruction ID: ff902caf70590d694fa0d43c680045aff4057827a11a881c62c9203462ddc284
                                                          • Opcode Fuzzy Hash: 9bd89e677aa26ee8bfa3f908eb9da445b79f507721883a2ab04f462f8f52f68e
                                                          • Instruction Fuzzy Hash: E6B125316093429FC710DF29C894A6EB7E5FFA9760F10891DF19AC7291E738D844CBA2
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,0080CC08), ref: 007F40BB
                                                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 007F40CD
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,0080CC08), ref: 007F40F2
                                                          • FreeLibrary.KERNEL32(00000000,?,0080CC08), ref: 007F413E
                                                          • StringFromGUID2.OLE32(?,?,00000028,?,0080CC08), ref: 007F41A8
                                                          • SysFreeString.OLEAUT32(00000009), ref: 007F4262
                                                          • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 007F42C8
                                                          • SysFreeString.OLEAUT32(?), ref: 007F42F2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                          • String ID: GetModuleHandleExW$kernel32.dll
                                                          • API String ID: 354098117-199464113
                                                          • Opcode ID: c204594e4fd51f1e1867fcd9f65179bc1c46476124abd29513634e2e73aa7bc8
                                                          • Instruction ID: fd36aa0395061aa0bd3804ff0a58bab91a2800303d595ebb71705baec56bd4a1
                                                          • Opcode Fuzzy Hash: c204594e4fd51f1e1867fcd9f65179bc1c46476124abd29513634e2e73aa7bc8
                                                          • Instruction Fuzzy Hash: B8120975A00119EFDB14DF94C888EBEB7B5FF45318F248098EA05AB251DB35ED46CBA0
                                                          APIs
                                                          • GetMenuItemCount.USER32(00841990), ref: 007B2F8D
                                                          • GetMenuItemCount.USER32(00841990), ref: 007B303D
                                                          • GetCursorPos.USER32(?), ref: 007B3081
                                                          • SetForegroundWindow.USER32(00000000), ref: 007B308A
                                                          • TrackPopupMenuEx.USER32(00841990,00000000,?,00000000,00000000,00000000), ref: 007B309D
                                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 007B30A9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                          • String ID: 0
                                                          • API String ID: 36266755-4108050209
                                                          • Opcode ID: 14b08c1cf7b2da2d4767123d8d2d9d77b126641e19f2dcb5ead91f30a6f36d7a
                                                          • Instruction ID: 97fbe6a6df4f3454d6b647ae71e84ca0ddf21424e6b90f4e3704d46bfe7d6578
                                                          • Opcode Fuzzy Hash: 14b08c1cf7b2da2d4767123d8d2d9d77b126641e19f2dcb5ead91f30a6f36d7a
                                                          • Instruction Fuzzy Hash: 94714B70641205BFEB219F24CC89FEABF65FF05364F204206F5286A1E2C7B9AD50DB50
                                                          APIs
                                                          • DestroyWindow.USER32(00000000,?), ref: 00806DEB
                                                            • Part of subcall function 00776B57: _wcslen.LIBCMT ref: 00776B6A
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00806E5F
                                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00806E81
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00806E94
                                                          • DestroyWindow.USER32(?), ref: 00806EB5
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00770000,00000000), ref: 00806EE4
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00806EFD
                                                          • GetDesktopWindow.USER32 ref: 00806F16
                                                          • GetWindowRect.USER32(00000000), ref: 00806F1D
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00806F35
                                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00806F4D
                                                            • Part of subcall function 00789944: GetWindowLongW.USER32(?,000000EB), ref: 00789952
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                          • String ID: 0$tooltips_class32
                                                          • API String ID: 2429346358-3619404913
                                                          • Opcode ID: ce97bec37870c9751959afe4ddad5326085c58fbb89594ab62eaf769b235109e
                                                          • Instruction ID: dc40ead2e1f292c2c4bf624e6e26b4ccbf1c45d0daab204b0ccb0db3205cb0f4
                                                          • Opcode Fuzzy Hash: ce97bec37870c9751959afe4ddad5326085c58fbb89594ab62eaf769b235109e
                                                          • Instruction Fuzzy Hash: 6E719A74100341AFDBA1CF18DC48EAABBE9FB89304F54051DF999C72A1DB31E966CB11
                                                          APIs
                                                            • Part of subcall function 00789BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00789BB2
                                                          • DragQueryPoint.SHELL32(?,?), ref: 00809147
                                                            • Part of subcall function 00807674: ClientToScreen.USER32(?,?), ref: 0080769A
                                                            • Part of subcall function 00807674: GetWindowRect.USER32(?,?), ref: 00807710
                                                            • Part of subcall function 00807674: PtInRect.USER32(?,?,00808B89), ref: 00807720
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 008091B0
                                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 008091BB
                                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 008091DE
                                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00809225
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 0080923E
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00809255
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00809277
                                                          • DragFinish.SHELL32(?), ref: 0080927E
                                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00809371
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                          • API String ID: 221274066-3440237614
                                                          • Opcode ID: cc71ba3a3f485e5ef0dee28ba614f25a6cfaf74cd9d021134900ad473dd0d836
                                                          • Instruction ID: 9730cf2891603fbe019b7b00d842c342cee2b55175323c66b52e81e09deabe52
                                                          • Opcode Fuzzy Hash: cc71ba3a3f485e5ef0dee28ba614f25a6cfaf74cd9d021134900ad473dd0d836
                                                          • Instruction Fuzzy Hash: 63616C71108301AFDB41DF64DC89DAFBBE8FF99350F004A1DF6A5922A1DB309A49CB52
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 007EC4B0
                                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 007EC4C3
                                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 007EC4D7
                                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 007EC4F0
                                                          • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 007EC533
                                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 007EC549
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 007EC554
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 007EC584
                                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 007EC5DC
                                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 007EC5F0
                                                          • InternetCloseHandle.WININET(00000000), ref: 007EC5FB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                          • String ID:
                                                          • API String ID: 3800310941-3916222277
                                                          • Opcode ID: 1ca59a0f1065525fd9d3d86f85d2a93ef696539dee004e00e06499a2e79e2ef9
                                                          • Instruction ID: 422cc7f16f29991847b5705e0daea81e97baf6295134a97c8bdc7b1b1671ff5d
                                                          • Opcode Fuzzy Hash: 1ca59a0f1065525fd9d3d86f85d2a93ef696539dee004e00e06499a2e79e2ef9
                                                          • Instruction Fuzzy Hash: 6B518DB4501388BFEB229F66C988AAB7BFCFF08344F10451AF945D6250DB38E915DB60
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00808592
                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 008085A2
                                                          • GlobalAlloc.KERNEL32(00000002,00000000), ref: 008085AD
                                                          • CloseHandle.KERNEL32(00000000), ref: 008085BA
                                                          • GlobalLock.KERNEL32(00000000), ref: 008085C8
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 008085D7
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 008085E0
                                                          • CloseHandle.KERNEL32(00000000), ref: 008085E7
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 008085F8
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,0080FC38,?), ref: 00808611
                                                          • GlobalFree.KERNEL32(00000000), ref: 00808621
                                                          • GetObjectW.GDI32(?,00000018,000000FF), ref: 00808641
                                                          • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00808671
                                                          • DeleteObject.GDI32(00000000), ref: 00808699
                                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 008086AF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                          • String ID:
                                                          • API String ID: 3840717409-0
                                                          • Opcode ID: e7f2402374a674bede1e06dcde5665163932a67ddd37387443d9dd521585c62a
                                                          • Instruction ID: f009ef9cf9aa0ee5bb30e3d4017dea3ff1e4f5c908bb6d2baafbd2afac576fa9
                                                          • Opcode Fuzzy Hash: e7f2402374a674bede1e06dcde5665163932a67ddd37387443d9dd521585c62a
                                                          • Instruction Fuzzy Hash: 37414A71600208EFDB519FA5CC88EAE7BB8FF99711F108158F91AE72A0DB319D41CB20
                                                          APIs
                                                          • VariantInit.OLEAUT32(00000000), ref: 007E1502
                                                          • VariantCopy.OLEAUT32(?,?), ref: 007E150B
                                                          • VariantClear.OLEAUT32(?), ref: 007E1517
                                                          • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 007E15FB
                                                          • VarR8FromDec.OLEAUT32(?,?), ref: 007E1657
                                                          • VariantInit.OLEAUT32(?), ref: 007E1708
                                                          • SysFreeString.OLEAUT32(?), ref: 007E178C
                                                          • VariantClear.OLEAUT32(?), ref: 007E17D8
                                                          • VariantClear.OLEAUT32(?), ref: 007E17E7
                                                          • VariantInit.OLEAUT32(00000000), ref: 007E1823
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                          • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                          • API String ID: 1234038744-3931177956
                                                          • Opcode ID: f3b5e8689a0455a66633e18297e473a40b1f79be5ac212ab88b3fcf42dec4262
                                                          • Instruction ID: 190b000ca568982199915e3269def8b253c66a1c272a54495595173c31b8294f
                                                          • Opcode Fuzzy Hash: f3b5e8689a0455a66633e18297e473a40b1f79be5ac212ab88b3fcf42dec4262
                                                          • Instruction Fuzzy Hash: 28D11571A01145EBDB00AF66D88ABBDB7B5BF49700F50815AF806AB184DB3CEC60DB61
                                                          APIs
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                            • Part of subcall function 007FC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007FB6AE,?,?), ref: 007FC9B5
                                                            • Part of subcall function 007FC998: _wcslen.LIBCMT ref: 007FC9F1
                                                            • Part of subcall function 007FC998: _wcslen.LIBCMT ref: 007FCA68
                                                            • Part of subcall function 007FC998: _wcslen.LIBCMT ref: 007FCA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007FB6F4
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007FB772
                                                          • RegDeleteValueW.ADVAPI32(?,?), ref: 007FB80A
                                                          • RegCloseKey.ADVAPI32(?), ref: 007FB87E
                                                          • RegCloseKey.ADVAPI32(?), ref: 007FB89C
                                                          • LoadLibraryA.KERNEL32(advapi32.dll), ref: 007FB8F2
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 007FB904
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 007FB922
                                                          • FreeLibrary.KERNEL32(00000000), ref: 007FB983
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 007FB994
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 146587525-4033151799
                                                          • Opcode ID: afe187ce53e08517a110c74de2e78c223d29cf1a0a41ba46cd882bb7d91087ca
                                                          • Instruction ID: cd081a539cdc0e133c9cc34f08412d920dc20d4e9ec5ec5be7651c3c40be45a3
                                                          • Opcode Fuzzy Hash: afe187ce53e08517a110c74de2e78c223d29cf1a0a41ba46cd882bb7d91087ca
                                                          • Instruction Fuzzy Hash: D0C17B31208205EFD714DF24C499F2ABBE5BF84358F14855CE69A8B3A2CB79EC45CB91
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 007F25D8
                                                          • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 007F25E8
                                                          • CreateCompatibleDC.GDI32(?), ref: 007F25F4
                                                          • SelectObject.GDI32(00000000,?), ref: 007F2601
                                                          • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 007F266D
                                                          • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 007F26AC
                                                          • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 007F26D0
                                                          • SelectObject.GDI32(?,?), ref: 007F26D8
                                                          • DeleteObject.GDI32(?), ref: 007F26E1
                                                          • DeleteDC.GDI32(?), ref: 007F26E8
                                                          • ReleaseDC.USER32(00000000,?), ref: 007F26F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                          • String ID: (
                                                          • API String ID: 2598888154-3887548279
                                                          • Opcode ID: 03582964579a884bb2e15f91dd864b6c79de407d349e9ddf6b4b0256a5f4c9f4
                                                          • Instruction ID: 376c2423c439bd0ce67cbf503bf8a00bb943eae204886a092194909124b8bbff
                                                          • Opcode Fuzzy Hash: 03582964579a884bb2e15f91dd864b6c79de407d349e9ddf6b4b0256a5f4c9f4
                                                          • Instruction Fuzzy Hash: 6261D275D00219EFCF14CFA4D884AAEBBB5FF48310F208529EA55A7351E774A951CF60
                                                          APIs
                                                          • ___free_lconv_mon.LIBCMT ref: 007ADAA1
                                                            • Part of subcall function 007AD63C: _free.LIBCMT ref: 007AD659
                                                            • Part of subcall function 007AD63C: _free.LIBCMT ref: 007AD66B
                                                            • Part of subcall function 007AD63C: _free.LIBCMT ref: 007AD67D
                                                            • Part of subcall function 007AD63C: _free.LIBCMT ref: 007AD68F
                                                            • Part of subcall function 007AD63C: _free.LIBCMT ref: 007AD6A1
                                                            • Part of subcall function 007AD63C: _free.LIBCMT ref: 007AD6B3
                                                            • Part of subcall function 007AD63C: _free.LIBCMT ref: 007AD6C5
                                                            • Part of subcall function 007AD63C: _free.LIBCMT ref: 007AD6D7
                                                            • Part of subcall function 007AD63C: _free.LIBCMT ref: 007AD6E9
                                                            • Part of subcall function 007AD63C: _free.LIBCMT ref: 007AD6FB
                                                            • Part of subcall function 007AD63C: _free.LIBCMT ref: 007AD70D
                                                            • Part of subcall function 007AD63C: _free.LIBCMT ref: 007AD71F
                                                            • Part of subcall function 007AD63C: _free.LIBCMT ref: 007AD731
                                                          • _free.LIBCMT ref: 007ADA96
                                                            • Part of subcall function 007A29C8: HeapFree.KERNEL32(00000000,00000000,?,007AD7D1,00000000,00000000,00000000,00000000,?,007AD7F8,00000000,00000007,00000000,?,007ADBF5,00000000), ref: 007A29DE
                                                            • Part of subcall function 007A29C8: GetLastError.KERNEL32(00000000,?,007AD7D1,00000000,00000000,00000000,00000000,?,007AD7F8,00000000,00000007,00000000,?,007ADBF5,00000000,00000000), ref: 007A29F0
                                                          • _free.LIBCMT ref: 007ADAB8
                                                          • _free.LIBCMT ref: 007ADACD
                                                          • _free.LIBCMT ref: 007ADAD8
                                                          • _free.LIBCMT ref: 007ADAFA
                                                          • _free.LIBCMT ref: 007ADB0D
                                                          • _free.LIBCMT ref: 007ADB1B
                                                          • _free.LIBCMT ref: 007ADB26
                                                          • _free.LIBCMT ref: 007ADB5E
                                                          • _free.LIBCMT ref: 007ADB65
                                                          • _free.LIBCMT ref: 007ADB82
                                                          • _free.LIBCMT ref: 007ADB9A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                          • String ID:
                                                          • API String ID: 161543041-0
                                                          • Opcode ID: 93eff5da3b64ef0b8986d2c5b88b9ea045bd7f7dc51739eb9e51b10bdbbdf609
                                                          • Instruction ID: ac293dbc983880a2aa39b06f2c50e558c2f13938ea6b165d68366d8d40f25bd4
                                                          • Opcode Fuzzy Hash: 93eff5da3b64ef0b8986d2c5b88b9ea045bd7f7dc51739eb9e51b10bdbbdf609
                                                          • Instruction Fuzzy Hash: 77318D71604304DFEB31AA78E849B5B77E8FF82710F108619E04AE75A2DF38BC408B21
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 007D369C
                                                          • _wcslen.LIBCMT ref: 007D36A7
                                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 007D3797
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 007D380C
                                                          • GetDlgCtrlID.USER32(?), ref: 007D385D
                                                          • GetWindowRect.USER32(?,?), ref: 007D3882
                                                          • GetParent.USER32(?), ref: 007D38A0
                                                          • ScreenToClient.USER32(00000000), ref: 007D38A7
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 007D3921
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 007D395D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                          • String ID: %s%u
                                                          • API String ID: 4010501982-679674701
                                                          • Opcode ID: f1704dc72d6dfaa9f134fff0634f5f13ea3224cecdb4e694c1659d014890a52a
                                                          • Instruction ID: a9d77e4d542d9964fc6eb0f16447f50d570e799ec5952ad9850fb053fef87004
                                                          • Opcode Fuzzy Hash: f1704dc72d6dfaa9f134fff0634f5f13ea3224cecdb4e694c1659d014890a52a
                                                          • Instruction Fuzzy Hash: AC91B571204606EFD715DF24C895FAAF7B8FF44354F00462AF999D2290DB38EA45CBA2
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 007D4994
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 007D49DA
                                                          • _wcslen.LIBCMT ref: 007D49EB
                                                          • CharUpperBuffW.USER32(?,00000000), ref: 007D49F7
                                                          • _wcsstr.LIBVCRUNTIME ref: 007D4A2C
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 007D4A64
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 007D4A9D
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 007D4AE6
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 007D4B20
                                                          • GetWindowRect.USER32(?,?), ref: 007D4B8B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                          • String ID: ThumbnailClass
                                                          • API String ID: 1311036022-1241985126
                                                          • Opcode ID: 62ede99ef3a46b73bb397d704cf81ae4e7a12b689dfbbda98553c1e183e7b4b7
                                                          • Instruction ID: 269083cf78f837d8415c93d4d604ecd98c6352ebfe8ab8c371acd154bd3c61ee
                                                          • Opcode Fuzzy Hash: 62ede99ef3a46b73bb397d704cf81ae4e7a12b689dfbbda98553c1e183e7b4b7
                                                          • Instruction Fuzzy Hash: 4491CB710042059FDB04CF14C989FAA77E8FF94354F04856BFD899A296EB38ED45CBA1
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(00841990,000000FF,00000000,00000030), ref: 007DBFAC
                                                          • SetMenuItemInfoW.USER32(00841990,00000004,00000000,00000030), ref: 007DBFE1
                                                          • Sleep.KERNEL32(000001F4), ref: 007DBFF3
                                                          • GetMenuItemCount.USER32(?), ref: 007DC039
                                                          • GetMenuItemID.USER32(?,00000000), ref: 007DC056
                                                          • GetMenuItemID.USER32(?,-00000001), ref: 007DC082
                                                          • GetMenuItemID.USER32(?,?), ref: 007DC0C9
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 007DC10F
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007DC124
                                                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007DC145
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                          • String ID: 0
                                                          • API String ID: 1460738036-4108050209
                                                          • Opcode ID: d6e1c6192ba0200bce235bc1cc7d261f9b751b27b8e38d41c40a4ed6f969d99f
                                                          • Instruction ID: f02b8e588d1266f5fa03c4522f93260658a2f4a91b7ad503893e8c1a58bb5eb0
                                                          • Opcode Fuzzy Hash: d6e1c6192ba0200bce235bc1cc7d261f9b751b27b8e38d41c40a4ed6f969d99f
                                                          • Instruction Fuzzy Hash: F06190B090025AEFDF22CF68DD88AEEBBB8FB05344F104156E911A3391D739AD45CB60
                                                          APIs
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 007FCC64
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 007FCC8D
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 007FCD48
                                                            • Part of subcall function 007FCC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 007FCCAA
                                                            • Part of subcall function 007FCC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 007FCCBD
                                                            • Part of subcall function 007FCC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 007FCCCF
                                                            • Part of subcall function 007FCC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 007FCD05
                                                            • Part of subcall function 007FCC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 007FCD28
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 007FCCF3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 2734957052-4033151799
                                                          • Opcode ID: 9a7a0fe4c64274749280e0ce867a2ce8dc80e01ab48e8f8b4bc6721cc0fbb5ac
                                                          • Instruction ID: 4e909b6df606c4cb770612ba03bd49ba3ec972e4cf72d60d53847a1776bcb962
                                                          • Opcode Fuzzy Hash: 9a7a0fe4c64274749280e0ce867a2ce8dc80e01ab48e8f8b4bc6721cc0fbb5ac
                                                          • Instruction Fuzzy Hash: A2316F71A0112DBBDB618F54DD88EFFBB7CEF45750F000165BA06E6240DB389A45EAB0
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 007E3D40
                                                          • _wcslen.LIBCMT ref: 007E3D6D
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 007E3D9D
                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 007E3DBE
                                                          • RemoveDirectoryW.KERNEL32(?), ref: 007E3DCE
                                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 007E3E55
                                                          • CloseHandle.KERNEL32(00000000), ref: 007E3E60
                                                          • CloseHandle.KERNEL32(00000000), ref: 007E3E6B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                          • String ID: :$\$\??\%s
                                                          • API String ID: 1149970189-3457252023
                                                          • Opcode ID: ebb59e1622235b37924ef4c277b9a63022213ae134ee846df76e92c65a210574
                                                          • Instruction ID: 3ab0f72292340fe3fe3d55a2d8b868110c8b59be300dcbd2bd8c0b2c0f22b742
                                                          • Opcode Fuzzy Hash: ebb59e1622235b37924ef4c277b9a63022213ae134ee846df76e92c65a210574
                                                          • Instruction Fuzzy Hash: 2631AF72A00249ABDB21DFA1DC49FEB37BCFF88700F5041A5F519D6160EB7897448B64
                                                          APIs
                                                          • timeGetTime.WINMM ref: 007DE6B4
                                                            • Part of subcall function 0078E551: timeGetTime.WINMM(?,?,007DE6D4), ref: 0078E555
                                                          • Sleep.KERNEL32(0000000A), ref: 007DE6E1
                                                          • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 007DE705
                                                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 007DE727
                                                          • SetActiveWindow.USER32 ref: 007DE746
                                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 007DE754
                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 007DE773
                                                          • Sleep.KERNEL32(000000FA), ref: 007DE77E
                                                          • IsWindow.USER32 ref: 007DE78A
                                                          • EndDialog.USER32(00000000), ref: 007DE79B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                          • String ID: BUTTON
                                                          • API String ID: 1194449130-3405671355
                                                          • Opcode ID: 482134a446abd9b83a1c912cb95235915f4fc6ddb6a9668f8347dca3095e34ca
                                                          • Instruction ID: c1cb124f92c73b5c7b4e172691b1736bda87216f8115b3159d2189886059819f
                                                          • Opcode Fuzzy Hash: 482134a446abd9b83a1c912cb95235915f4fc6ddb6a9668f8347dca3095e34ca
                                                          • Instruction Fuzzy Hash: 4321A874204204AFEB51AFA0ECCDA363B79F765358F504526F415853B1DB79AC00CB65
                                                          APIs
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 007DEA5D
                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 007DEA73
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007DEA84
                                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 007DEA96
                                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 007DEAA7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: SendString$_wcslen
                                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                          • API String ID: 2420728520-1007645807
                                                          • Opcode ID: b137e6c84b1f23986a404963c4d466166c89ebe1a71652fe73514e7c13efed40
                                                          • Instruction ID: e776966f3e5536350e8da9d407de714854cf176a00417d0c08ba334150477d96
                                                          • Opcode Fuzzy Hash: b137e6c84b1f23986a404963c4d466166c89ebe1a71652fe73514e7c13efed40
                                                          • Instruction Fuzzy Hash: 6F119131A90219B9DB21B7A5DD4AEFF6A7CFBD2B40F00842A7825E61D0EE781915C5F0
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 007DA012
                                                          • SetKeyboardState.USER32(?), ref: 007DA07D
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 007DA09D
                                                          • GetKeyState.USER32(000000A0), ref: 007DA0B4
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 007DA0E3
                                                          • GetKeyState.USER32(000000A1), ref: 007DA0F4
                                                          • GetAsyncKeyState.USER32(00000011), ref: 007DA120
                                                          • GetKeyState.USER32(00000011), ref: 007DA12E
                                                          • GetAsyncKeyState.USER32(00000012), ref: 007DA157
                                                          • GetKeyState.USER32(00000012), ref: 007DA165
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 007DA18E
                                                          • GetKeyState.USER32(0000005B), ref: 007DA19C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 8e93fa20356b53e96e6eccec90230cfc92e4e0b93821a076eb5b2af6534ce1df
                                                          • Instruction ID: a8b169a7069683dafa9d5a2b35e7bc6788b6a5444540840165c6e9fec156d501
                                                          • Opcode Fuzzy Hash: 8e93fa20356b53e96e6eccec90230cfc92e4e0b93821a076eb5b2af6534ce1df
                                                          • Instruction Fuzzy Hash: 9C51CB2190478879FB35EB7088557EABFB5AF12340F08459BD5C2573C2EA5CAA4CC763
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000001), ref: 007D5CE2
                                                          • GetWindowRect.USER32(00000000,?), ref: 007D5CFB
                                                          • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 007D5D59
                                                          • GetDlgItem.USER32(?,00000002), ref: 007D5D69
                                                          • GetWindowRect.USER32(00000000,?), ref: 007D5D7B
                                                          • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 007D5DCF
                                                          • GetDlgItem.USER32(?,000003E9), ref: 007D5DDD
                                                          • GetWindowRect.USER32(00000000,?), ref: 007D5DEF
                                                          • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 007D5E31
                                                          • GetDlgItem.USER32(?,000003EA), ref: 007D5E44
                                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 007D5E5A
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 007D5E67
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMoveRect$Invalidate
                                                          • String ID:
                                                          • API String ID: 3096461208-0
                                                          • Opcode ID: 4603cb51c4615390d778bdd6ae1d0f1eacf7076cca79b57a5d6fcc6d6974b78b
                                                          • Instruction ID: cb2a4c621c51d0a2b86cef6fe5ebeaca7346385bf18b86fc3820ab4b606bb901
                                                          • Opcode Fuzzy Hash: 4603cb51c4615390d778bdd6ae1d0f1eacf7076cca79b57a5d6fcc6d6974b78b
                                                          • Instruction Fuzzy Hash: 20510E71B00609AFDF18DF68DD89AAEBBB6FB58301F148229F515E7290D7749E04CB60
                                                          APIs
                                                            • Part of subcall function 00788F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00788BE8,?,00000000,?,?,?,?,00788BBA,00000000,?), ref: 00788FC5
                                                          • DestroyWindow.USER32(?), ref: 00788C81
                                                          • KillTimer.USER32(00000000,?,?,?,?,00788BBA,00000000,?), ref: 00788D1B
                                                          • DestroyAcceleratorTable.USER32(00000000), ref: 007C6973
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00788BBA,00000000,?), ref: 007C69A1
                                                          • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00788BBA,00000000,?), ref: 007C69B8
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00788BBA,00000000), ref: 007C69D4
                                                          • DeleteObject.GDI32(00000000), ref: 007C69E6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                          • String ID:
                                                          • API String ID: 641708696-0
                                                          • Opcode ID: 674dc178d8b1f8f4cc8bd7ecad4a0963ee3331a5387fd9b11cedb95efc42b3a6
                                                          • Instruction ID: a8ec9afbd607045c38f34694dad961b4567d23894d164810028f22096384c67e
                                                          • Opcode Fuzzy Hash: 674dc178d8b1f8f4cc8bd7ecad4a0963ee3331a5387fd9b11cedb95efc42b3a6
                                                          • Instruction Fuzzy Hash: EE61A035141600DFDB61AF14D98CB29BBF1FB45312F94865CE042976A4CB39ADC0CF62
                                                          APIs
                                                            • Part of subcall function 00789944: GetWindowLongW.USER32(?,000000EB), ref: 00789952
                                                          • GetSysColor.USER32(0000000F), ref: 00789862
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ColorLongWindow
                                                          • String ID:
                                                          • API String ID: 259745315-0
                                                          • Opcode ID: 0f2f53ccb2aa90d165ab1c886d9d8a972be3180311e76ea4a3cbb8f309bec8c2
                                                          • Instruction ID: d3a0f6f26c089fc3480ca70186293d99cbd657bb0e2d1e515a00e6acbeede648
                                                          • Opcode Fuzzy Hash: 0f2f53ccb2aa90d165ab1c886d9d8a972be3180311e76ea4a3cbb8f309bec8c2
                                                          • Instruction Fuzzy Hash: E441C331184740AFDB246F389C88BB93BA5FB46330F184719FAA2871E1D7399C42DB10
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: .y
                                                          • API String ID: 0-2155845462
                                                          • Opcode ID: c745de89e85114623adbef3db85eebea6767397376a4de4dba41c35147959639
                                                          • Instruction ID: e776413c48aa4e4d2570dbaaa9a3b3c11362f526d636b7a53da1f1bf88591042
                                                          • Opcode Fuzzy Hash: c745de89e85114623adbef3db85eebea6767397376a4de4dba41c35147959639
                                                          • Instruction Fuzzy Hash: A9C1E77590424ADFCF51DFA8D845BAEBBB0BF8B310F144299F614A7392C7389941CB61
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,007BF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 007D9717
                                                          • LoadStringW.USER32(00000000,?,007BF7F8,00000001), ref: 007D9720
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                          • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,007BF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 007D9742
                                                          • LoadStringW.USER32(00000000,?,007BF7F8,00000001), ref: 007D9745
                                                          • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 007D9866
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message_wcslen
                                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                          • API String ID: 747408836-2268648507
                                                          • Opcode ID: ad2df7177e402d2774b8c7ae4f746240134fff91593112ebd553b102ecfd97bd
                                                          • Instruction ID: 5faf33e88d0f5f5a5281b839d75cf145de27ba977088d3d09cd88b6ef0b107bf
                                                          • Opcode Fuzzy Hash: ad2df7177e402d2774b8c7ae4f746240134fff91593112ebd553b102ecfd97bd
                                                          • Instruction Fuzzy Hash: D4412E72900209EACF14EBE0CD5ADEEB778EF55780F508125F60972192EA396F48DB61
                                                          APIs
                                                            • Part of subcall function 00776B57: _wcslen.LIBCMT ref: 00776B6A
                                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 007D07A2
                                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 007D07BE
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 007D07DA
                                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 007D0804
                                                          • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 007D082C
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 007D0837
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 007D083C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                          • API String ID: 323675364-22481851
                                                          • Opcode ID: 7d4271c882c04a7d2c95bfee4211f9adac21ab8b699d17889d1889b5c810e9f8
                                                          • Instruction ID: 3c9b776328673bd4760f5b9322beacf0b7973de5127a6fcab8dd5bccb98530ab
                                                          • Opcode Fuzzy Hash: 7d4271c882c04a7d2c95bfee4211f9adac21ab8b699d17889d1889b5c810e9f8
                                                          • Instruction Fuzzy Hash: E141F772810629EBDF15EFA4DC89DEDB778FF44390F148129E915A72A1EB385E04CB90
                                                          APIs
                                                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0080403B
                                                          • CreateCompatibleDC.GDI32(00000000), ref: 00804042
                                                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00804055
                                                          • SelectObject.GDI32(00000000,00000000), ref: 0080405D
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 00804068
                                                          • DeleteDC.GDI32(00000000), ref: 00804072
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 0080407C
                                                          • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00804092
                                                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 0080409E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                          • String ID: static
                                                          • API String ID: 2559357485-2160076837
                                                          • Opcode ID: 863184fcfa8f7e9c02f3de2906e85fd89ebdef23a8e4d8b486f3d503e0590271
                                                          • Instruction ID: 699ff30f327480fb6c812c4c7eb79684fdedc68fc61c9436c0ba0305ce7bd365
                                                          • Opcode Fuzzy Hash: 863184fcfa8f7e9c02f3de2906e85fd89ebdef23a8e4d8b486f3d503e0590271
                                                          • Instruction Fuzzy Hash: 58315772141219ABDFA29FA8CC08FDA3B68FF09320F100310FA69E61E0CB75D861DB50
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 007F3C5C
                                                          • CoInitialize.OLE32(00000000), ref: 007F3C8A
                                                          • CoUninitialize.OLE32 ref: 007F3C94
                                                          • _wcslen.LIBCMT ref: 007F3D2D
                                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 007F3DB1
                                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 007F3ED5
                                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 007F3F0E
                                                          • CoGetObject.OLE32(?,00000000,0080FB98,?), ref: 007F3F2D
                                                          • SetErrorMode.KERNEL32(00000000), ref: 007F3F40
                                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 007F3FC4
                                                          • VariantClear.OLEAUT32(?), ref: 007F3FD8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                          • String ID:
                                                          • API String ID: 429561992-0
                                                          • Opcode ID: 1459192cd7989f83e04888a356c82e1549b2e8c3ef106688682456edf6d02731
                                                          • Instruction ID: a3ee6914274b69bdf9191159f5b4fb2d5c8b6f8a28d564dcd065e9fcc2a847a5
                                                          • Opcode Fuzzy Hash: 1459192cd7989f83e04888a356c82e1549b2e8c3ef106688682456edf6d02731
                                                          • Instruction Fuzzy Hash: ABC124716082099FD700DF68C88492BB7E9FF89758F10491DFA8A9B351D735EE05CB52
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 007E7AF3
                                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 007E7B8F
                                                          • SHGetDesktopFolder.SHELL32(?), ref: 007E7BA3
                                                          • CoCreateInstance.OLE32(0080FD08,00000000,00000001,00836E6C,?), ref: 007E7BEF
                                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 007E7C74
                                                          • CoTaskMemFree.OLE32(?,?), ref: 007E7CCC
                                                          • SHBrowseForFolderW.SHELL32(?), ref: 007E7D57
                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 007E7D7A
                                                          • CoTaskMemFree.OLE32(00000000), ref: 007E7D81
                                                          • CoTaskMemFree.OLE32(00000000), ref: 007E7DD6
                                                          • CoUninitialize.OLE32 ref: 007E7DDC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                          • String ID:
                                                          • API String ID: 2762341140-0
                                                          • Opcode ID: 81530f2a5f34ab38aea665eb6b90013d5a5ace06517619adb73595da9658eb22
                                                          • Instruction ID: d2730d390828ab9f8f56b1b8da22083b9aab0551c37677c73262c35b6f45b984
                                                          • Opcode Fuzzy Hash: 81530f2a5f34ab38aea665eb6b90013d5a5ace06517619adb73595da9658eb22
                                                          • Instruction Fuzzy Hash: 66C13975A05149EFCB14DFA5C888DAEBBF9FF48304B1485A8E819DB261D734EE41CB90
                                                          APIs
                                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00805504
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00805515
                                                          • CharNextW.USER32(00000158), ref: 00805544
                                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00805585
                                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0080559B
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 008055AC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CharNext
                                                          • String ID:
                                                          • API String ID: 1350042424-0
                                                          • Opcode ID: 6537b1af956088be8250d961039c5736c101930fedc05278ae232fee722a524a
                                                          • Instruction ID: a963c41caa23c725771cd6861fd010ad6a41d3da77b8cc4bb2443f741462109b
                                                          • Opcode Fuzzy Hash: 6537b1af956088be8250d961039c5736c101930fedc05278ae232fee722a524a
                                                          • Instruction Fuzzy Hash: 86615875901A08AADFA09F54CC84AFF7BB9FB09724F104149F925EA2D0D7749A81DF70
                                                          APIs
                                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 007CFAAF
                                                          • SafeArrayAllocData.OLEAUT32(?), ref: 007CFB08
                                                          • VariantInit.OLEAUT32(?), ref: 007CFB1A
                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 007CFB3A
                                                          • VariantCopy.OLEAUT32(?,?), ref: 007CFB8D
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 007CFBA1
                                                          • VariantClear.OLEAUT32(?), ref: 007CFBB6
                                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 007CFBC3
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 007CFBCC
                                                          • VariantClear.OLEAUT32(?), ref: 007CFBDE
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 007CFBE9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                          • String ID:
                                                          • API String ID: 2706829360-0
                                                          • Opcode ID: 6183aee371af5f57b40d506a68b691ae9c1fd4ebc03255f24e67fdd5c24f02c0
                                                          • Instruction ID: 6cdf9c63916a4d0e6be1ce7ff3dafd3b52a5f54cac4fb8585ab8ed3fd502dd04
                                                          • Opcode Fuzzy Hash: 6183aee371af5f57b40d506a68b691ae9c1fd4ebc03255f24e67fdd5c24f02c0
                                                          • Instruction Fuzzy Hash: 49413E75A00219EFCB00DF64D858EAEBBBAFF48354F00816DE945A7261CB34AD45CBA0
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 007D9CA1
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 007D9D22
                                                          • GetKeyState.USER32(000000A0), ref: 007D9D3D
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 007D9D57
                                                          • GetKeyState.USER32(000000A1), ref: 007D9D6C
                                                          • GetAsyncKeyState.USER32(00000011), ref: 007D9D84
                                                          • GetKeyState.USER32(00000011), ref: 007D9D96
                                                          • GetAsyncKeyState.USER32(00000012), ref: 007D9DAE
                                                          • GetKeyState.USER32(00000012), ref: 007D9DC0
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 007D9DD8
                                                          • GetKeyState.USER32(0000005B), ref: 007D9DEA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 13d7789ba3a03e25e2f5a663f5237d78948fbf81a47ea200648b19a1343e7f6f
                                                          • Instruction ID: bad5cd5e0a10dbfa93d92d6984130977548ff62d7aaec10aeb20e24807212a8d
                                                          • Opcode Fuzzy Hash: 13d7789ba3a03e25e2f5a663f5237d78948fbf81a47ea200648b19a1343e7f6f
                                                          • Instruction Fuzzy Hash: 574195346047C969FF719B7488043B5BEB17B21344F08815BDBCA567C2EBAD99C8C7A2
                                                          APIs
                                                          • WSAStartup.WSOCK32(00000101,?), ref: 007F05BC
                                                          • inet_addr.WSOCK32(?), ref: 007F061C
                                                          • gethostbyname.WSOCK32(?), ref: 007F0628
                                                          • IcmpCreateFile.IPHLPAPI ref: 007F0636
                                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 007F06C6
                                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 007F06E5
                                                          • IcmpCloseHandle.IPHLPAPI(?), ref: 007F07B9
                                                          • WSACleanup.WSOCK32 ref: 007F07BF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                          • String ID: Ping
                                                          • API String ID: 1028309954-2246546115
                                                          • Opcode ID: 229801b79aec9731080717fabd5463023d730139e3563a2c7861867d5b9c6cd6
                                                          • Instruction ID: b15d63156a54ab23f27ea9b7eec30bc1b5e5373d9580ddfed429e39e9fc7f293
                                                          • Opcode Fuzzy Hash: 229801b79aec9731080717fabd5463023d730139e3563a2c7861867d5b9c6cd6
                                                          • Instruction Fuzzy Hash: BD916A75608205DFDB20DF19C488F2ABBE0AF48318F1485A9E5698B7A2C778ED41CFD1
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharLower
                                                          • String ID: cdecl$none$stdcall$winapi
                                                          • API String ID: 707087890-567219261
                                                          • Opcode ID: d931ea5f0850bb428c6d45ce9a8783e43430131baef72303c81d943d721b8d8a
                                                          • Instruction ID: 375b2f11c821edd7214fded223bc36433e444ea8a8a67550de019b9e8b2b4cfc
                                                          • Opcode Fuzzy Hash: d931ea5f0850bb428c6d45ce9a8783e43430131baef72303c81d943d721b8d8a
                                                          • Instruction Fuzzy Hash: F951C432A0051AEBCF54DF6CC9519BEB3A5BF64360B204229E625E73C4EB38DD40C791
                                                          APIs
                                                          • CoInitialize.OLE32 ref: 007F3774
                                                          • CoUninitialize.OLE32 ref: 007F377F
                                                          • CoCreateInstance.OLE32(?,00000000,00000017,0080FB78,?), ref: 007F37D9
                                                          • IIDFromString.OLE32(?,?), ref: 007F384C
                                                          • VariantInit.OLEAUT32(?), ref: 007F38E4
                                                          • VariantClear.OLEAUT32(?), ref: 007F3936
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                          • API String ID: 636576611-1287834457
                                                          • Opcode ID: dcd7b23c395964a2278ca72c58e01a7b5ed47ee3fcec80e9c1fab09a94868a21
                                                          • Instruction ID: f8d774c7350bd9fb4f153d4a5bb3fc14d7e00be03021479b5796b73c4f07a97f
                                                          • Opcode Fuzzy Hash: dcd7b23c395964a2278ca72c58e01a7b5ed47ee3fcec80e9c1fab09a94868a21
                                                          • Instruction Fuzzy Hash: B3618CB0608305AFD710EF54C889B6AB7E4EF48754F104919FA959B391C778EE48CBA2
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 007E33CF
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                          • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 007E33F0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: LoadString$_wcslen
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 4099089115-3080491070
                                                          • Opcode ID: af677b8cfc26eab5795fbb12ead2320eacff486a02abbe44b5ba860449bcf8d2
                                                          • Instruction ID: 0b47d806c4e2f05f256eb8de886b8021714898a261f302cb350ff8164f3999b3
                                                          • Opcode Fuzzy Hash: af677b8cfc26eab5795fbb12ead2320eacff486a02abbe44b5ba860449bcf8d2
                                                          • Instruction Fuzzy Hash: DF519071901209EADF15EBA0CD4AEEEB778FF15380F108165F50972292EB392F58DB61
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                          • API String ID: 1256254125-769500911
                                                          • Opcode ID: 0d0d904a4770c7558c36940b075f02a45a627260e4705a449d4998634c0b7071
                                                          • Instruction ID: 467568797185f9e6842b777dd26177d5ef021c192a9c4528b5561b982b0f4378
                                                          • Opcode Fuzzy Hash: 0d0d904a4770c7558c36940b075f02a45a627260e4705a449d4998634c0b7071
                                                          • Instruction Fuzzy Hash: 4841C332A00026DBCB205F7D88905BE77B5BBA4BA4B26422BE521D7384F739DD81C790
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 007E53A0
                                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 007E5416
                                                          • GetLastError.KERNEL32 ref: 007E5420
                                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 007E54A7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Error$Mode$DiskFreeLastSpace
                                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                          • API String ID: 4194297153-14809454
                                                          • Opcode ID: 4ad0dd1dc6c5be477a6795aa1e16bfa806828687745c32314e4037406e2b0ed4
                                                          • Instruction ID: 70fceca2fe51d809b1c4ac991f41dab3c9369ed3a1d416162f259c59929ec4a5
                                                          • Opcode Fuzzy Hash: 4ad0dd1dc6c5be477a6795aa1e16bfa806828687745c32314e4037406e2b0ed4
                                                          • Instruction Fuzzy Hash: B131D375A01188DFCB10DF69C488AA9BBF4FF4A309F148165E505CB292D779DD86CB90
                                                          APIs
                                                          • CreateMenu.USER32 ref: 00803C79
                                                          • SetMenu.USER32(?,00000000), ref: 00803C88
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00803D10
                                                          • IsMenu.USER32(?), ref: 00803D24
                                                          • CreatePopupMenu.USER32 ref: 00803D2E
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00803D5B
                                                          • DrawMenuBar.USER32 ref: 00803D63
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                          • String ID: 0$F
                                                          • API String ID: 161812096-3044882817
                                                          • Opcode ID: 09a56a6d17faba12cab4c9fa3f01fcc8f561a63cda5d3d54e3c41f00319d750f
                                                          • Instruction ID: 5645109170c59be40314a96dee861d88775fbaaff55bda139dbd0b2f55545fba
                                                          • Opcode Fuzzy Hash: 09a56a6d17faba12cab4c9fa3f01fcc8f561a63cda5d3d54e3c41f00319d750f
                                                          • Instruction Fuzzy Hash: 3B413A79A01209EFDF54CF64DC44AAA7BB9FF49350F140129ED46E73A0D770AA10DB94
                                                          APIs
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                            • Part of subcall function 007D3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007D3CCA
                                                          • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 007D1F64
                                                          • GetDlgCtrlID.USER32 ref: 007D1F6F
                                                          • GetParent.USER32 ref: 007D1F8B
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 007D1F8E
                                                          • GetDlgCtrlID.USER32(?), ref: 007D1F97
                                                          • GetParent.USER32(?), ref: 007D1FAB
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 007D1FAE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 711023334-1403004172
                                                          • Opcode ID: 0d30347a88f999370fcada69181f4989d148ba16efd7473cc7a5652524e8434e
                                                          • Instruction ID: 62833fc07cabff5979fb219ae1b5d823c85c97b01396a7cacf820f1dbd1995b8
                                                          • Opcode Fuzzy Hash: 0d30347a88f999370fcada69181f4989d148ba16efd7473cc7a5652524e8434e
                                                          • Instruction Fuzzy Hash: 9F21B070A01214BBCF15AFA0CC89DEEBBB8FF15350F40465AB965A7291DB3959089B60
                                                          APIs
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                            • Part of subcall function 007D3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007D3CCA
                                                          • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 007D2043
                                                          • GetDlgCtrlID.USER32 ref: 007D204E
                                                          • GetParent.USER32 ref: 007D206A
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 007D206D
                                                          • GetDlgCtrlID.USER32(?), ref: 007D2076
                                                          • GetParent.USER32(?), ref: 007D208A
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 007D208D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 711023334-1403004172
                                                          • Opcode ID: 748b2e2542a3efb0ad1fc2b5000c8ddd0b338fc207e165608a8b21cb6cb7c2de
                                                          • Instruction ID: cbc1f0b2440ac9c306e43ec67e86cbec20e7e449103ce07df757a1fa281d3b1a
                                                          • Opcode Fuzzy Hash: 748b2e2542a3efb0ad1fc2b5000c8ddd0b338fc207e165608a8b21cb6cb7c2de
                                                          • Instruction Fuzzy Hash: AE21D471A01214BBCF10AFA0CC49EEEBBB8FF25340F104516B965A72A1DB794916DB70
                                                          APIs
                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00803A9D
                                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00803AA0
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00803AC7
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00803AEA
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00803B62
                                                          • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00803BAC
                                                          • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00803BC7
                                                          • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00803BE2
                                                          • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00803BF6
                                                          • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00803C13
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow
                                                          • String ID:
                                                          • API String ID: 312131281-0
                                                          • Opcode ID: e03a3ad413b6f5de6145f02cf2fa3f7f0e003378c265838d5fffa46161b80649
                                                          • Instruction ID: aa3a6c9a8720e31cc0c94ca82d252f189a56b9f38cfc44d369811b291f869add
                                                          • Opcode Fuzzy Hash: e03a3ad413b6f5de6145f02cf2fa3f7f0e003378c265838d5fffa46161b80649
                                                          • Instruction Fuzzy Hash: A3617975A00208AFDB21DFA8CC85EEE77B8FB09714F100199FA15E72E1D774AA81DB50
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 007DB151
                                                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,007DA1E1,?,00000001), ref: 007DB165
                                                          • GetWindowThreadProcessId.USER32(00000000), ref: 007DB16C
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007DA1E1,?,00000001), ref: 007DB17B
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 007DB18D
                                                          • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,007DA1E1,?,00000001), ref: 007DB1A6
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007DA1E1,?,00000001), ref: 007DB1B8
                                                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,007DA1E1,?,00000001), ref: 007DB1FD
                                                          • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,007DA1E1,?,00000001), ref: 007DB212
                                                          • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,007DA1E1,?,00000001), ref: 007DB21D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                          • String ID:
                                                          • API String ID: 2156557900-0
                                                          • Opcode ID: d1ab89e809f9b4b77134075b6fb3283e7b889cb991430617985ff13434feca82
                                                          • Instruction ID: c81e0c92b711df5b676c08ee625ff8d5287f9089bf355b0d5a61fa2d01ea8f37
                                                          • Opcode Fuzzy Hash: d1ab89e809f9b4b77134075b6fb3283e7b889cb991430617985ff13434feca82
                                                          • Instruction Fuzzy Hash: 3B31A576500604FFDB209F64EC84B6D7BB9BB52355F11420AFA11D6290E7B9AD40CF70
                                                          APIs
                                                          • _free.LIBCMT ref: 007A2C94
                                                            • Part of subcall function 007A29C8: HeapFree.KERNEL32(00000000,00000000,?,007AD7D1,00000000,00000000,00000000,00000000,?,007AD7F8,00000000,00000007,00000000,?,007ADBF5,00000000), ref: 007A29DE
                                                            • Part of subcall function 007A29C8: GetLastError.KERNEL32(00000000,?,007AD7D1,00000000,00000000,00000000,00000000,?,007AD7F8,00000000,00000007,00000000,?,007ADBF5,00000000,00000000), ref: 007A29F0
                                                          • _free.LIBCMT ref: 007A2CA0
                                                          • _free.LIBCMT ref: 007A2CAB
                                                          • _free.LIBCMT ref: 007A2CB6
                                                          • _free.LIBCMT ref: 007A2CC1
                                                          • _free.LIBCMT ref: 007A2CCC
                                                          • _free.LIBCMT ref: 007A2CD7
                                                          • _free.LIBCMT ref: 007A2CE2
                                                          • _free.LIBCMT ref: 007A2CED
                                                          • _free.LIBCMT ref: 007A2CFB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: f37af312a0c4c33c0a984dd5f416d4187307648b1b8c50e0cb029a96478916c7
                                                          • Instruction ID: 3f28ff0e719fe3335d9dbf946b50c22f2984387d14e981bcf3ce050d9d1ce337
                                                          • Opcode Fuzzy Hash: f37af312a0c4c33c0a984dd5f416d4187307648b1b8c50e0cb029a96478916c7
                                                          • Instruction Fuzzy Hash: 5A11C676100108EFCB42EF58D846CDE3BA5FF46750F5146A0FA48AB232D635FA519FA1
                                                          APIs
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 007E7FAD
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 007E7FC1
                                                          • GetFileAttributesW.KERNEL32(?), ref: 007E7FEB
                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 007E8005
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 007E8017
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 007E8060
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 007E80B0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$AttributesFile
                                                          • String ID: *.*
                                                          • API String ID: 769691225-438819550
                                                          • Opcode ID: dd33a42ef83f0cb0c4380bdf7ef3718b2a2de4a651bbb238e62eb9318f7db53a
                                                          • Instruction ID: ac4239f0f8d464ff0bb3b4c9ce477ca01a956e1d31f6b9832e29a571c7e45e71
                                                          • Opcode Fuzzy Hash: dd33a42ef83f0cb0c4380bdf7ef3718b2a2de4a651bbb238e62eb9318f7db53a
                                                          • Instruction Fuzzy Hash: 7B81A1725092819BCB28EF16C4459AEB3E8BF8C314F544C5EF889D7250EB39DD45CB52
                                                          APIs
                                                          • SetWindowLongW.USER32(?,000000EB), ref: 00775C7A
                                                            • Part of subcall function 00775D0A: GetClientRect.USER32(?,?), ref: 00775D30
                                                            • Part of subcall function 00775D0A: GetWindowRect.USER32(?,?), ref: 00775D71
                                                            • Part of subcall function 00775D0A: ScreenToClient.USER32(?,?), ref: 00775D99
                                                          • GetDC.USER32 ref: 007B46F5
                                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 007B4708
                                                          • SelectObject.GDI32(00000000,00000000), ref: 007B4716
                                                          • SelectObject.GDI32(00000000,00000000), ref: 007B472B
                                                          • ReleaseDC.USER32(?,00000000), ref: 007B4733
                                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 007B47C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                          • String ID: U
                                                          • API String ID: 4009187628-3372436214
                                                          • Opcode ID: 633bb2f1b846a57bdf740db4a3c807b741912a619cb15578121083a245fb3202
                                                          • Instruction ID: 3185df4f664c190fcf6e32ec0795424418ad54c25d88ecb7532e44e7e365e3bd
                                                          • Opcode Fuzzy Hash: 633bb2f1b846a57bdf740db4a3c807b741912a619cb15578121083a245fb3202
                                                          • Instruction Fuzzy Hash: 8B710030400205EFCF228F64C985BFA3BB5FF4A364F144269ED559A2A7CB398881DF60
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 007E35E4
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                          • LoadStringW.USER32(00842390,?,00000FFF,?), ref: 007E360A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: LoadString$_wcslen
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 4099089115-2391861430
                                                          • Opcode ID: 12f5d85cc1951b18a520ab320b2f9b1feeb9512209a78f1d9617955295796f65
                                                          • Instruction ID: 59b5c0ad7650770c16e777236b4d609f79d4692c0545fb1c787962f719b9087b
                                                          • Opcode Fuzzy Hash: 12f5d85cc1951b18a520ab320b2f9b1feeb9512209a78f1d9617955295796f65
                                                          • Instruction Fuzzy Hash: 7B515E71801249FADF15EBA0CC4AEEDBB74FF15340F148125F619721A1EB391A98DFA1
                                                          APIs
                                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 007EC272
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 007EC29A
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 007EC2CA
                                                          • GetLastError.KERNEL32 ref: 007EC322
                                                          • SetEvent.KERNEL32(?), ref: 007EC336
                                                          • InternetCloseHandle.WININET(00000000), ref: 007EC341
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                          • String ID:
                                                          • API String ID: 3113390036-3916222277
                                                          • Opcode ID: b09b5afa257903675db8771e36b65af2761366634d54097665e26de11dab028f
                                                          • Instruction ID: 004abe6c9ee5c19ca0fa68d6e01143608f99c6c6cd0cfa2fa93399d652d52964
                                                          • Opcode Fuzzy Hash: b09b5afa257903675db8771e36b65af2761366634d54097665e26de11dab028f
                                                          • Instruction Fuzzy Hash: 9A31A0B5501284AFD7229F668C88AAB7BFCFB4D744F14851DF446D3200DB38DD068B61
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,007B3AAF,?,?,Bad directive syntax error,0080CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 007D98BC
                                                          • LoadStringW.USER32(00000000,?,007B3AAF,?), ref: 007D98C3
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 007D9987
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadMessageModuleString_wcslen
                                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                          • API String ID: 858772685-4153970271
                                                          • Opcode ID: b582b13a0e89c68e9d96831fe604b3e25aa99ae48cbbfcdd4d1d250fd3818f46
                                                          • Instruction ID: 211d4ba1715fdc60672dbb9594af5ff2b05e38de6ed9b96e80a0d1cb66d534f5
                                                          • Opcode Fuzzy Hash: b582b13a0e89c68e9d96831fe604b3e25aa99ae48cbbfcdd4d1d250fd3818f46
                                                          • Instruction Fuzzy Hash: 85218631C00219FBCF15AF90CC1AEEE7779FF14340F048466F619661A1EB79A628DB51
                                                          APIs
                                                          • GetParent.USER32 ref: 007D20AB
                                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 007D20C0
                                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 007D214D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameParentSend
                                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                          • API String ID: 1290815626-3381328864
                                                          • Opcode ID: be58824bccadc660a1769114616573c43cd7fab8b1aae9c95a25bce1e7d8c89c
                                                          • Instruction ID: 4be00bba7728416f374f67791df86eb225a1e38462eba671e026f4c5bbb371f1
                                                          • Opcode Fuzzy Hash: be58824bccadc660a1769114616573c43cd7fab8b1aae9c95a25bce1e7d8c89c
                                                          • Instruction Fuzzy Hash: D611E77668470AB9FA112624AC0ADA677ACEF24734F208217F704E52D2FA6E58035654
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                          • String ID:
                                                          • API String ID: 1282221369-0
                                                          • Opcode ID: 4a483dfc891a44862d1735f82b3dc5eefb40d4be25cb2af4ab675b360681f24b
                                                          • Instruction ID: 447e7e78a774a5a57d2f27eb318a55a52659cc9b57d4b302de0bbae0af4baaa9
                                                          • Opcode Fuzzy Hash: 4a483dfc891a44862d1735f82b3dc5eefb40d4be25cb2af4ab675b360681f24b
                                                          • Instruction Fuzzy Hash: ED613973904200FFDF26AFB8984976A7B95AF87320F04436DFA55A7242D63D9D01CB50
                                                          APIs
                                                          • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00805186
                                                          • ShowWindow.USER32(?,00000000), ref: 008051C7
                                                          • ShowWindow.USER32(?,00000005,?,00000000), ref: 008051CD
                                                          • SetFocus.USER32(?,?,00000005,?,00000000), ref: 008051D1
                                                            • Part of subcall function 00806FBA: DeleteObject.GDI32(00000000), ref: 00806FE6
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0080520D
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0080521A
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0080524D
                                                          • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00805287
                                                          • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00805296
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                          • String ID:
                                                          • API String ID: 3210457359-0
                                                          • Opcode ID: 4f9669c97c88fe650a68abeb506b2a68bc02bdf6bf015626285747a2cf0d57b7
                                                          • Instruction ID: c231fa7c544f7db204a72c049ddbc24aa8b18154fd8240c2d2940ee10ea1d156
                                                          • Opcode Fuzzy Hash: 4f9669c97c88fe650a68abeb506b2a68bc02bdf6bf015626285747a2cf0d57b7
                                                          • Instruction Fuzzy Hash: 75518D30A91A09FFEFA09F28CC4AB9A3B65FF05325F148111F625D62E0C775A990DF61
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 007C6890
                                                          • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 007C68A9
                                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 007C68B9
                                                          • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 007C68D1
                                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 007C68F2
                                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00788874,00000000,00000000,00000000,000000FF,00000000), ref: 007C6901
                                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 007C691E
                                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00788874,00000000,00000000,00000000,000000FF,00000000), ref: 007C692D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                          • String ID:
                                                          • API String ID: 1268354404-0
                                                          • Opcode ID: 464266b508f5d38e9470413934925cf61716879abea773da968992b393809640
                                                          • Instruction ID: 2f521138f7a5dc72e2ad9eefe15b38fbaf61bc12366e74551a59a78ebd6aeb55
                                                          • Opcode Fuzzy Hash: 464266b508f5d38e9470413934925cf61716879abea773da968992b393809640
                                                          • Instruction Fuzzy Hash: 9F518AB0640209EFDB60EF24CC95FAA7BB5FB98750F10461CF916972A0DB78E990DB50
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 007EC182
                                                          • GetLastError.KERNEL32 ref: 007EC195
                                                          • SetEvent.KERNEL32(?), ref: 007EC1A9
                                                            • Part of subcall function 007EC253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 007EC272
                                                            • Part of subcall function 007EC253: GetLastError.KERNEL32 ref: 007EC322
                                                            • Part of subcall function 007EC253: SetEvent.KERNEL32(?), ref: 007EC336
                                                            • Part of subcall function 007EC253: InternetCloseHandle.WININET(00000000), ref: 007EC341
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                          • String ID:
                                                          • API String ID: 337547030-0
                                                          • Opcode ID: 4829ae913a1884b7fba43a8154d6c2f820d62f1e1930afecc7a592dd49e1c077
                                                          • Instruction ID: 50b425e1c92e36a9966a22f3a9e5c551372eb86243fbbeb728623c36e17bc417
                                                          • Opcode Fuzzy Hash: 4829ae913a1884b7fba43a8154d6c2f820d62f1e1930afecc7a592dd49e1c077
                                                          • Instruction Fuzzy Hash: 4A318F79202685EFDB229FAADC44A76BBFDFF1C300B04451DFA5686610D738E8169B60
                                                          APIs
                                                            • Part of subcall function 007D3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 007D3A57
                                                            • Part of subcall function 007D3A3D: GetCurrentThreadId.KERNEL32 ref: 007D3A5E
                                                            • Part of subcall function 007D3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007D25B3), ref: 007D3A65
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 007D25BD
                                                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 007D25DB
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 007D25DF
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 007D25E9
                                                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 007D2601
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 007D2605
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 007D260F
                                                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 007D2623
                                                          • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 007D2627
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                          • String ID:
                                                          • API String ID: 2014098862-0
                                                          • Opcode ID: 809ca6deea9001341fabd8298789e92a55ad2ca6fecfc6752271f729064ac10e
                                                          • Instruction ID: 73190c2740902d5ab93d486a8574369f7e86306eac7df175d2c0a9a9912d4708
                                                          • Opcode Fuzzy Hash: 809ca6deea9001341fabd8298789e92a55ad2ca6fecfc6752271f729064ac10e
                                                          • Instruction Fuzzy Hash: 5A01D830390210BBFB606B689C8EF593F69EB5EB11F100106F314AF1D1C9E654458AAA
                                                          APIs
                                                          • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,007D1449,?,?,00000000), ref: 007D180C
                                                          • HeapAlloc.KERNEL32(00000000,?,007D1449,?,?,00000000), ref: 007D1813
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,007D1449,?,?,00000000), ref: 007D1828
                                                          • GetCurrentProcess.KERNEL32(?,00000000,?,007D1449,?,?,00000000), ref: 007D1830
                                                          • DuplicateHandle.KERNEL32(00000000,?,007D1449,?,?,00000000), ref: 007D1833
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,007D1449,?,?,00000000), ref: 007D1843
                                                          • GetCurrentProcess.KERNEL32(007D1449,00000000,?,007D1449,?,?,00000000), ref: 007D184B
                                                          • DuplicateHandle.KERNEL32(00000000,?,007D1449,?,?,00000000), ref: 007D184E
                                                          • CreateThread.KERNEL32(00000000,00000000,007D1874,00000000,00000000,00000000), ref: 007D1868
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                          • String ID:
                                                          • API String ID: 1957940570-0
                                                          • Opcode ID: f81218f9edcb7c66f0eb2cc5b532786f3ac23ecd330f2b7675af82f591721500
                                                          • Instruction ID: 4f61a038fdc760744ff3119441266ada13117cbf5db7da101df4d5952b3c2e50
                                                          • Opcode Fuzzy Hash: f81218f9edcb7c66f0eb2cc5b532786f3ac23ecd330f2b7675af82f591721500
                                                          • Instruction Fuzzy Hash: 1701BBB5240308BFE750AFA5DC4DF6B7BACFB89B11F418511FA05DB2A2CA749800CB20
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: __alldvrm$_strrchr
                                                          • String ID: }}y$}}y$}}y
                                                          • API String ID: 1036877536-1917491473
                                                          • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                          • Instruction ID: 068a21e564a763bfb6107686cc08dc82abec53634eda17ad242182b02678879e
                                                          • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                          • Instruction Fuzzy Hash: 8AA14872E103869FDB15CF18C8917AEBBE4EFE3350F1442ADE5959B282C2BD8981C750
                                                          APIs
                                                            • Part of subcall function 007DD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 007DD501
                                                            • Part of subcall function 007DD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 007DD50F
                                                            • Part of subcall function 007DD4DC: CloseHandle.KERNEL32(00000000), ref: 007DD5DC
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 007FA16D
                                                          • GetLastError.KERNEL32 ref: 007FA180
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 007FA1B3
                                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 007FA268
                                                          • GetLastError.KERNEL32(00000000), ref: 007FA273
                                                          • CloseHandle.KERNEL32(00000000), ref: 007FA2C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                          • String ID: SeDebugPrivilege
                                                          • API String ID: 2533919879-2896544425
                                                          • Opcode ID: 4e0b7f7a03a81709def100e0469e1507e0050efd2414102ca72bea8c947c72fc
                                                          • Instruction ID: 2d8a8aadecf7bc6c9cb7facfa51950bc30d46059712e7d6dd4deafc8d1fc55bc
                                                          • Opcode Fuzzy Hash: 4e0b7f7a03a81709def100e0469e1507e0050efd2414102ca72bea8c947c72fc
                                                          • Instruction Fuzzy Hash: E4618F71204246AFD710DF18C498F29BBE1BF84318F19849CE56A4B7A3C77AED45CB92
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00803925
                                                          • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0080393A
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00803954
                                                          • _wcslen.LIBCMT ref: 00803999
                                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 008039C6
                                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 008039F4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window_wcslen
                                                          • String ID: SysListView32
                                                          • API String ID: 2147712094-78025650
                                                          • Opcode ID: 513571a21c126df8f73cc2e25a4c4d27a9fda8b86491df6a97a433ca538aabe0
                                                          • Instruction ID: 8ee8f4defb5f41cfe7d7cec58d7f995cb8d9b8c64d27c1e639df673491ec9cb1
                                                          • Opcode Fuzzy Hash: 513571a21c126df8f73cc2e25a4c4d27a9fda8b86491df6a97a433ca538aabe0
                                                          • Instruction Fuzzy Hash: 4041A071A00219ABEF619F64CC49FEA7BADFF08350F10052AF958E72C1D7759A80CB90
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007DBCFD
                                                          • IsMenu.USER32(00000000), ref: 007DBD1D
                                                          • CreatePopupMenu.USER32 ref: 007DBD53
                                                          • GetMenuItemCount.USER32(010A68D0), ref: 007DBDA4
                                                          • InsertMenuItemW.USER32(010A68D0,?,00000001,00000030), ref: 007DBDCC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                          • String ID: 0$2
                                                          • API String ID: 93392585-3793063076
                                                          • Opcode ID: 2842445db0e20baeee46d0d61f7ef6c995a0a1ff92a50d98bd9dd092be8b0438
                                                          • Instruction ID: 7f231cb3f2ecd7ed835c0eace1e409fa38b922eed36afa9f8e1098c977311b45
                                                          • Opcode Fuzzy Hash: 2842445db0e20baeee46d0d61f7ef6c995a0a1ff92a50d98bd9dd092be8b0438
                                                          • Instruction Fuzzy Hash: 8951AF70B00205EBDF11CFA8D888BAEBBF6BF49314F15425BE44197391D778A941CB61
                                                          APIs
                                                          • _ValidateLocalCookies.LIBCMT ref: 00792D4B
                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00792D53
                                                          • _ValidateLocalCookies.LIBCMT ref: 00792DE1
                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00792E0C
                                                          • _ValidateLocalCookies.LIBCMT ref: 00792E61
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                          • String ID: &Hy$csm
                                                          • API String ID: 1170836740-3238203172
                                                          • Opcode ID: d45156fdf437b89192cfc2a1b8d372bc03c0d42133c7961df6ea1b2b8dec2749
                                                          • Instruction ID: 85ce1ba64ae360ec310ff301e5e735a0f654e3f7c613be67a16c60059c7d47b9
                                                          • Opcode Fuzzy Hash: d45156fdf437b89192cfc2a1b8d372bc03c0d42133c7961df6ea1b2b8dec2749
                                                          • Instruction Fuzzy Hash: F041B534A01209FBCF14EF68D849A9EBBB5BF45324F148155E814AB393D7399E02CBD0
                                                          APIs
                                                          • LoadIconW.USER32(00000000,00007F03), ref: 007DC913
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: IconLoad
                                                          • String ID: blank$info$question$stop$warning
                                                          • API String ID: 2457776203-404129466
                                                          • Opcode ID: 231adf7b462b8b2c04bfce736aa382e752bda636aff1557ce044d0e381594dc8
                                                          • Instruction ID: cf38743cf32d7f812a00a7deb7b215f218a100a83ac5ebbc99eed7e4e868cd2a
                                                          • Opcode Fuzzy Hash: 231adf7b462b8b2c04bfce736aa382e752bda636aff1557ce044d0e381594dc8
                                                          • Instruction Fuzzy Hash: 6D11EB31689307BEEB025B54EC93CAA67BCEF15364B50412BF500E6382E77C6D0192A4
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                          • String ID: 0.0.0.0
                                                          • API String ID: 642191829-3771769585
                                                          • Opcode ID: 1d8bf474562f1bdd0a1ad0e31a0eaac1cf87f25d00c039ff6d15e4db32e6eaaf
                                                          • Instruction ID: 4e1d2b56adf0be60dee62c792e122225de842b4d522e8352024ae81340719617
                                                          • Opcode Fuzzy Hash: 1d8bf474562f1bdd0a1ad0e31a0eaac1cf87f25d00c039ff6d15e4db32e6eaaf
                                                          • Instruction Fuzzy Hash: 0011E771904104EFCB306B649C0AEDE777CEB14711F04016AF44596291EF789E818B50
                                                          APIs
                                                            • Part of subcall function 00789BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00789BB2
                                                          • GetSystemMetrics.USER32(0000000F), ref: 00809FC7
                                                          • GetSystemMetrics.USER32(0000000F), ref: 00809FE7
                                                          • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0080A224
                                                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0080A242
                                                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0080A263
                                                          • ShowWindow.USER32(00000003,00000000), ref: 0080A282
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 0080A2A7
                                                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 0080A2CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                          • String ID:
                                                          • API String ID: 1211466189-0
                                                          • Opcode ID: 8c412ea0810832b52bb312b00c323b923b16a598a28b47428eb4e58859e6e8aa
                                                          • Instruction ID: 7e88a5a20b6736788197d311ebe4fb828d40f7e04fdca72031fc65dee00edfa7
                                                          • Opcode Fuzzy Hash: 8c412ea0810832b52bb312b00c323b923b16a598a28b47428eb4e58859e6e8aa
                                                          • Instruction Fuzzy Hash: A3B18935600219EFDF58CF68C9857AE7BB2FF48701F098169EC89DB295DB31A940CB51
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$LocalTime
                                                          • String ID:
                                                          • API String ID: 952045576-0
                                                          • Opcode ID: 98a7de81358668e93d2f6a7c082c4ce86c3d5ef6cfd54fe463175875151b6c39
                                                          • Instruction ID: e928c34635bf35643081e2cc9b3d9fbf57e3c67ed96e0bd7074e8c82fe47fd27
                                                          • Opcode Fuzzy Hash: 98a7de81358668e93d2f6a7c082c4ce86c3d5ef6cfd54fe463175875151b6c39
                                                          • Instruction Fuzzy Hash: 88418066C10218B5DF11FBB49C8E9CFB7B8AF45710F508562E518E3222FB38E655C3A5
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,007C682C,00000004,00000000,00000000), ref: 0078F953
                                                          • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,007C682C,00000004,00000000,00000000), ref: 007CF3D1
                                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,007C682C,00000004,00000000,00000000), ref: 007CF454
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: 0aa4496c799721a1e83ee6a370163fdffa3035185faf42ee15862e2d607db570
                                                          • Instruction ID: a7029f782ebec5749f6e9fc4dbeb332bcc587591009897b2bf841173df195298
                                                          • Opcode Fuzzy Hash: 0aa4496c799721a1e83ee6a370163fdffa3035185faf42ee15862e2d607db570
                                                          • Instruction Fuzzy Hash: F7411531648680FEC739AF2DC888B2A7F92BB56320F14453CE087D6660C63EB980CB11
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00802D1B
                                                          • GetDC.USER32(00000000), ref: 00802D23
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00802D2E
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00802D3A
                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00802D76
                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00802D87
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00805A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00802DC2
                                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00802DE1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                          • String ID:
                                                          • API String ID: 3864802216-0
                                                          • Opcode ID: d301b8292e6e77a3146fac3ab5ad77fc42d1a5cd302a1e6e6f925b0381b9a902
                                                          • Instruction ID: ced511fd39f1fa56090cd0f400c3a80500d584e537d85659682e313431730232
                                                          • Opcode Fuzzy Hash: d301b8292e6e77a3146fac3ab5ad77fc42d1a5cd302a1e6e6f925b0381b9a902
                                                          • Instruction Fuzzy Hash: 19317872201214ABEBA18F548C8AFAB3BA9FB1A711F044155FE08DA2D1C6B59C41CBA0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 6685076326dc5db78050ef37e39940aea8c1de181e87791e64b5d60f2e1a2f2d
                                                          • Instruction ID: 19eabeb6f2701306dde603ac5546525d5d0831e9e41086fe9aac431f20ab0c48
                                                          • Opcode Fuzzy Hash: 6685076326dc5db78050ef37e39940aea8c1de181e87791e64b5d60f2e1a2f2d
                                                          • Instruction Fuzzy Hash: 1E212C61744A19F7E61555109D87FFA337CFF20B94F944022FE149AB82F72CED2086A5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: NULL Pointer assignment$Not an Object type
                                                          • API String ID: 0-572801152
                                                          • Opcode ID: 8fdd78773fd525c22e73f207052e586a68c63ae35325d5b9e3eb2308eeb3427f
                                                          • Instruction ID: 05ab46e38483b1a66026c6267c28b6bfa961768fed64c4951903288a2f15f4d4
                                                          • Opcode Fuzzy Hash: 8fdd78773fd525c22e73f207052e586a68c63ae35325d5b9e3eb2308eeb3427f
                                                          • Instruction Fuzzy Hash: BCD18071A0060EAFDB10CF68C885BBEB7B5BF48354F148169EA15AB381E774DD41CB90
                                                          APIs
                                                          • GetCPInfo.KERNEL32(?,?), ref: 007B15CE
                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 007B1651
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007B16E4
                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 007B16FB
                                                            • Part of subcall function 007A3820: RtlAllocateHeap.NTDLL(00000000,?,00841444,?,0078FDF5,?,?,0077A976,00000010,00841440,007713FC,?,007713C6,?,00771129), ref: 007A3852
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007B1777
                                                          • __freea.LIBCMT ref: 007B17A2
                                                          • __freea.LIBCMT ref: 007B17AE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                          • String ID:
                                                          • API String ID: 2829977744-0
                                                          • Opcode ID: 6fa8af8e740b1f492a4343924a15f005fad49df84e2e72093805dab65eef638d
                                                          • Instruction ID: 69f360c365e9cf206217ffff0de2459804920d125fcbaf74d7edcd1e995ce034
                                                          • Opcode Fuzzy Hash: 6fa8af8e740b1f492a4343924a15f005fad49df84e2e72093805dab65eef638d
                                                          • Instruction Fuzzy Hash: 1691A271E102169ADB208F74C8A5BEEBBB5AF49310FD84669F801E7141DB2DDD40CBA0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit
                                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                          • API String ID: 2610073882-625585964
                                                          • Opcode ID: 1582eb9cf53258d6905b92a4a4b1ec498ffc49b566d3b9671b3b61ce188a8d5b
                                                          • Instruction ID: 9d592c23d4963a0b44bb23b3ba9e8d5f611e7c7edd2d0b05bc1238ffc61d22ad
                                                          • Opcode Fuzzy Hash: 1582eb9cf53258d6905b92a4a4b1ec498ffc49b566d3b9671b3b61ce188a8d5b
                                                          • Instruction Fuzzy Hash: 90917F71A00219ABDF20DFA5C888EAFB7B8FF46714F108559F615AB380D7789945CBA0
                                                          APIs
                                                          • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 007E125C
                                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 007E1284
                                                          • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 007E12A8
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 007E12D8
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 007E135F
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 007E13C4
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 007E1430
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                          • String ID:
                                                          • API String ID: 2550207440-0
                                                          • Opcode ID: 2e234c5035646b46bd4f9b8cf47af50a82c9cbff803addcc21a214397e0677fa
                                                          • Instruction ID: c6bd373a940f096027c7dadd402e1d834061c5fd06e0ab042a953091a95ea94c
                                                          • Opcode Fuzzy Hash: 2e234c5035646b46bd4f9b8cf47af50a82c9cbff803addcc21a214397e0677fa
                                                          • Instruction Fuzzy Hash: 4591D575A01248DFDB00DFA5C88ABBE77B9FF49325F514029EA00EB291D77CA941CB90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: 85167bf8c7e4050ea02feaad7c08460ca0ecb0cbf8ec0305f142d07d1a159ad8
                                                          • Instruction ID: d715b1b912f6e54f4be4b84de584e64300f4d622d8b6229bcc43210ae2645f1c
                                                          • Opcode Fuzzy Hash: 85167bf8c7e4050ea02feaad7c08460ca0ecb0cbf8ec0305f142d07d1a159ad8
                                                          • Instruction Fuzzy Hash: 46914771940209EFCB14DFA9C888AEEBBB8FF49320F188149E515B7291D778A951CB60
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 007F396B
                                                          • CharUpperBuffW.USER32(?,?), ref: 007F3A7A
                                                          • _wcslen.LIBCMT ref: 007F3A8A
                                                          • VariantClear.OLEAUT32(?), ref: 007F3C1F
                                                            • Part of subcall function 007E0CDF: VariantInit.OLEAUT32(00000000), ref: 007E0D1F
                                                            • Part of subcall function 007E0CDF: VariantCopy.OLEAUT32(?,?), ref: 007E0D28
                                                            • Part of subcall function 007E0CDF: VariantClear.OLEAUT32(?), ref: 007E0D34
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                          • API String ID: 4137639002-1221869570
                                                          • Opcode ID: 4a93eb20fac34d609e84ed390175d009c3eee7aefc2d0f686bcdfa74cb1be9d2
                                                          • Instruction ID: 5070b663e75e34efa2c6cf2c92deb97a56aaa6fea9ea39de77e8c61f84a10012
                                                          • Opcode Fuzzy Hash: 4a93eb20fac34d609e84ed390175d009c3eee7aefc2d0f686bcdfa74cb1be9d2
                                                          • Instruction Fuzzy Hash: 5D914674608309DFCB04EF24C49596AB7E4BF88314F14892EF9899B351DB39EE45CB92
                                                          APIs
                                                            • Part of subcall function 007D000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,007CFF41,80070057,?,?,?,007D035E), ref: 007D002B
                                                            • Part of subcall function 007D000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007CFF41,80070057,?,?), ref: 007D0046
                                                            • Part of subcall function 007D000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007CFF41,80070057,?,?), ref: 007D0054
                                                            • Part of subcall function 007D000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007CFF41,80070057,?), ref: 007D0064
                                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 007F4C51
                                                          • _wcslen.LIBCMT ref: 007F4D59
                                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 007F4DCF
                                                          • CoTaskMemFree.OLE32(?), ref: 007F4DDA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                          • String ID: NULL Pointer assignment
                                                          • API String ID: 614568839-2785691316
                                                          • Opcode ID: 273756e4d3851c9d902a16d2dd72838a178b0226b446b27e5c01af34c8294f58
                                                          • Instruction ID: b52c27601bf1e5ab29cd63bfa7933af2643a37d9678c190fe284a3fcffbf0bc6
                                                          • Opcode Fuzzy Hash: 273756e4d3851c9d902a16d2dd72838a178b0226b446b27e5c01af34c8294f58
                                                          • Instruction Fuzzy Hash: 85912971D0021DEFDF14DFA4C895AEEB7B8BF48314F10816AE619A7251DB389A44CFA0
                                                          APIs
                                                          • GetMenu.USER32(?), ref: 00802183
                                                          • GetMenuItemCount.USER32(00000000), ref: 008021B5
                                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 008021DD
                                                          • _wcslen.LIBCMT ref: 00802213
                                                          • GetMenuItemID.USER32(?,?), ref: 0080224D
                                                          • GetSubMenu.USER32(?,?), ref: 0080225B
                                                            • Part of subcall function 007D3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 007D3A57
                                                            • Part of subcall function 007D3A3D: GetCurrentThreadId.KERNEL32 ref: 007D3A5E
                                                            • Part of subcall function 007D3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007D25B3), ref: 007D3A65
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 008022E3
                                                            • Part of subcall function 007DE97B: Sleep.KERNEL32 ref: 007DE9F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                          • String ID:
                                                          • API String ID: 4196846111-0
                                                          • Opcode ID: c5c0bf5da8da4bf5db083a786bacaea935066768a97437be778a8004a659ab8a
                                                          • Instruction ID: 91269a570e1e6a7182df64729b381ed7ba1ca225f5269173c6f1ccfcb1c88167
                                                          • Opcode Fuzzy Hash: c5c0bf5da8da4bf5db083a786bacaea935066768a97437be778a8004a659ab8a
                                                          • Instruction Fuzzy Hash: BA718E75A00215EFCB51EFA4CC49AAEB7F5FF48310F148459E816EB391DB78AD418B90
                                                          APIs
                                                          • IsWindow.USER32(010A6C18), ref: 00807F37
                                                          • IsWindowEnabled.USER32(010A6C18), ref: 00807F43
                                                          • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 0080801E
                                                          • SendMessageW.USER32(010A6C18,000000B0,?,?), ref: 00808051
                                                          • IsDlgButtonChecked.USER32(?,?), ref: 00808089
                                                          • GetWindowLongW.USER32(010A6C18,000000EC), ref: 008080AB
                                                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 008080C3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                          • String ID:
                                                          • API String ID: 4072528602-0
                                                          • Opcode ID: dc6d5cab5054e62689e75bdc9f1d92326b41c48562ef6ac789e00c7b1d0484f6
                                                          • Instruction ID: 1e613858d115f56d9b7a624dfb558bd1681432932bdfa719baa04dbe4561b8d3
                                                          • Opcode Fuzzy Hash: dc6d5cab5054e62689e75bdc9f1d92326b41c48562ef6ac789e00c7b1d0484f6
                                                          • Instruction Fuzzy Hash: 18716C34A08249EFEFB19F54CC94FAABBB5FF1A300F144459E955D72A1CB31A885DB20
                                                          APIs
                                                          • GetParent.USER32(?), ref: 007DAEF9
                                                          • GetKeyboardState.USER32(?), ref: 007DAF0E
                                                          • SetKeyboardState.USER32(?), ref: 007DAF6F
                                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 007DAF9D
                                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 007DAFBC
                                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 007DAFFD
                                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 007DB020
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 86bea82f8158ab96334126bbbd628e40f2832d08127db95c6f7a626ca4799dae
                                                          • Instruction ID: d3d615f5646f3a58181a263b3601e17fb85124d3da204fff067cd3897f3fd1d0
                                                          • Opcode Fuzzy Hash: 86bea82f8158ab96334126bbbd628e40f2832d08127db95c6f7a626ca4799dae
                                                          • Instruction Fuzzy Hash: 4D51D1A1A047D57DFB3643348849BBBBEB96B06304F08858AE1E9459C2C39DE9C8D761
                                                          APIs
                                                          • GetParent.USER32(00000000), ref: 007DAD19
                                                          • GetKeyboardState.USER32(?), ref: 007DAD2E
                                                          • SetKeyboardState.USER32(?), ref: 007DAD8F
                                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 007DADBB
                                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 007DADD8
                                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 007DAE17
                                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 007DAE38
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 6ea0a97096d9690e37fb0b25023ab47916ecf79f6abcacebf1eda6c0c41c1e00
                                                          • Instruction ID: 1dba3520c28bc2f1d85baef9936855cf3c26162d572aa5f67792db7e264d4509
                                                          • Opcode Fuzzy Hash: 6ea0a97096d9690e37fb0b25023ab47916ecf79f6abcacebf1eda6c0c41c1e00
                                                          • Instruction Fuzzy Hash: 6E51D5A16047D53DFB3683348C56B7A7FB97B46300F08858AE1D556AC2D29CEC88E762
                                                          APIs
                                                          • GetConsoleCP.KERNEL32(007B3CD6,?,?,?,?,?,?,?,?,007A5BA3,?,?,007B3CD6,?,?), ref: 007A5470
                                                          • __fassign.LIBCMT ref: 007A54EB
                                                          • __fassign.LIBCMT ref: 007A5506
                                                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,007B3CD6,00000005,00000000,00000000), ref: 007A552C
                                                          • WriteFile.KERNEL32(?,007B3CD6,00000000,007A5BA3,00000000,?,?,?,?,?,?,?,?,?,007A5BA3,?), ref: 007A554B
                                                          • WriteFile.KERNEL32(?,?,00000001,007A5BA3,00000000,?,?,?,?,?,?,?,?,?,007A5BA3,?), ref: 007A5584
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                          • String ID:
                                                          • API String ID: 1324828854-0
                                                          • Opcode ID: e573290df054a4f6e66ca1a6cf60e85ed797e05e7dc27e1e5e71c94f40c59bcc
                                                          • Instruction ID: 300417f962804ac7350cc23edd0547b67bfc43a6d5c23cdba87e7bc0066b6bde
                                                          • Opcode Fuzzy Hash: e573290df054a4f6e66ca1a6cf60e85ed797e05e7dc27e1e5e71c94f40c59bcc
                                                          • Instruction Fuzzy Hash: 6F51D471E006499FDB10CFA8D845AEEBBFAFF4A300F14421AF955E7291E7349A51CB60
                                                          APIs
                                                            • Part of subcall function 007F304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 007F307A
                                                            • Part of subcall function 007F304E: _wcslen.LIBCMT ref: 007F309B
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 007F1112
                                                          • WSAGetLastError.WSOCK32 ref: 007F1121
                                                          • WSAGetLastError.WSOCK32 ref: 007F11C9
                                                          • closesocket.WSOCK32(00000000), ref: 007F11F9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 2675159561-0
                                                          • Opcode ID: e2d9949c572b3d1eaf828ae3986e8e3c4e257a59fcdff6fe28db740693d804da
                                                          • Instruction ID: 5e8b7ed999b0932709a1a9227fb069fe7e806e1666aa510c1ff8320175b22d4a
                                                          • Opcode Fuzzy Hash: e2d9949c572b3d1eaf828ae3986e8e3c4e257a59fcdff6fe28db740693d804da
                                                          • Instruction Fuzzy Hash: 7541C33160020CEFDB109F24C889BB9B7E9FF45364F548159FA199B391C778AD41CBA1
                                                          APIs
                                                            • Part of subcall function 007DDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007DCF22,?), ref: 007DDDFD
                                                            • Part of subcall function 007DDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007DCF22,?), ref: 007DDE16
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 007DCF45
                                                          • MoveFileW.KERNEL32(?,?), ref: 007DCF7F
                                                          • _wcslen.LIBCMT ref: 007DD005
                                                          • _wcslen.LIBCMT ref: 007DD01B
                                                          • SHFileOperationW.SHELL32(?), ref: 007DD061
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                          • String ID: \*.*
                                                          • API String ID: 3164238972-1173974218
                                                          • Opcode ID: b24a3d1c0ff01aecae7cf978e77539a1237aa2063d2b8d00d5cd573107392a0d
                                                          • Instruction ID: 36d32938a45aa50a233d0aa3e431673f06528a4e5dda2b75140867fd8415b3d6
                                                          • Opcode Fuzzy Hash: b24a3d1c0ff01aecae7cf978e77539a1237aa2063d2b8d00d5cd573107392a0d
                                                          • Instruction Fuzzy Hash: EB4137729452199FDF13EFA4D985ADDB7B9AF48380F1400E7E505EB241EB38AA44CB50
                                                          APIs
                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00802E1C
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00802E4F
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00802E84
                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00802EB6
                                                          • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00802EE0
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00802EF1
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00802F0B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$MessageSend
                                                          • String ID:
                                                          • API String ID: 2178440468-0
                                                          • Opcode ID: ac2100d68c9ec69817ae6ed1481266e114f5afc7418855e8bbf9c50ef0344b33
                                                          • Instruction ID: 7d6d6c14581ffb861f1897fe1613fb862d46d08192ccfa0d53681f29d4b5bff5
                                                          • Opcode Fuzzy Hash: ac2100d68c9ec69817ae6ed1481266e114f5afc7418855e8bbf9c50ef0344b33
                                                          • Instruction Fuzzy Hash: 58311534685144AFDBA0CF58DC88F653BE4FB5A750F1401A4FA15CB2F2CBB1A880DB01
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007D7769
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007D778F
                                                          • SysAllocString.OLEAUT32(00000000), ref: 007D7792
                                                          • SysAllocString.OLEAUT32(?), ref: 007D77B0
                                                          • SysFreeString.OLEAUT32(?), ref: 007D77B9
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 007D77DE
                                                          • SysAllocString.OLEAUT32(?), ref: 007D77EC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: 5a8d3e8961943e4597f206814680ba153a5619252b18b5f77f5a287436d0664b
                                                          • Instruction ID: b55136538042f380b0eba41d62d0bd76b54b0ac8588e0dbbdaa9d8776e073ad7
                                                          • Opcode Fuzzy Hash: 5a8d3e8961943e4597f206814680ba153a5619252b18b5f77f5a287436d0664b
                                                          • Instruction Fuzzy Hash: 27219076604219AFDB14EFA8CC88CBB77ACFB097747048526FA15DB2A0E674DC41CB64
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007D7842
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007D7868
                                                          • SysAllocString.OLEAUT32(00000000), ref: 007D786B
                                                          • SysAllocString.OLEAUT32 ref: 007D788C
                                                          • SysFreeString.OLEAUT32 ref: 007D7895
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 007D78AF
                                                          • SysAllocString.OLEAUT32(?), ref: 007D78BD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: 4f0843a58123389dfcebf01b2ae8e229372e3dde37a4f8296d1c7ea508a7923f
                                                          • Instruction ID: d551198714c6917c684359437dc3f49f30d4df07df46f6b8bb417264eb2a17dd
                                                          • Opcode Fuzzy Hash: 4f0843a58123389dfcebf01b2ae8e229372e3dde37a4f8296d1c7ea508a7923f
                                                          • Instruction Fuzzy Hash: 98215335608204AFDB14AFB8DC8DDAA77FCFB097607108126F915CB2A1E678DC41DB64
                                                          APIs
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 007E04F2
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 007E052E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHandlePipe
                                                          • String ID: nul
                                                          • API String ID: 1424370930-2873401336
                                                          • Opcode ID: 035749a5596aee2949bffe7df0e9b224a46d108d5749008955b945a51289fbe8
                                                          • Instruction ID: 12a77032455488fff5d43d0538ca0e206a18495e78052d5c15f9267ce660ed40
                                                          • Opcode Fuzzy Hash: 035749a5596aee2949bffe7df0e9b224a46d108d5749008955b945a51289fbe8
                                                          • Instruction Fuzzy Hash: F7219171501345AFDB208F2ADC08E9A77B4BF49724F204A19F8A1D72E0D7B4D9A0CFA0
                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 007E05C6
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 007E0601
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHandlePipe
                                                          • String ID: nul
                                                          • API String ID: 1424370930-2873401336
                                                          • Opcode ID: 2963c7f11b8e5c437434729c8e20941b880204d3a508f7ae63352d92885e10fc
                                                          • Instruction ID: 4fb3c7ac8066b23dc4a01d54f843d4965c11651aba374a7e50f96d8d8ccae573
                                                          • Opcode Fuzzy Hash: 2963c7f11b8e5c437434729c8e20941b880204d3a508f7ae63352d92885e10fc
                                                          • Instruction Fuzzy Hash: B72192755013459BDB209F6ADC08B9A77F4BF99720F240B19F8A1E72E0D7F498A0CB90
                                                          APIs
                                                            • Part of subcall function 0077600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0077604C
                                                            • Part of subcall function 0077600E: GetStockObject.GDI32(00000011), ref: 00776060
                                                            • Part of subcall function 0077600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0077606A
                                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00804112
                                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0080411F
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0080412A
                                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00804139
                                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00804145
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CreateObjectStockWindow
                                                          • String ID: Msctls_Progress32
                                                          • API String ID: 1025951953-3636473452
                                                          • Opcode ID: e49246a35a8969d4a3472fe9f658b8c6f768d8613d9576101e060d547d6b34c1
                                                          • Instruction ID: bd8d9b37358b1d25a1e6bedfef346d10950c6f5d6bf5e4ba53c068da4e5b45eb
                                                          • Opcode Fuzzy Hash: e49246a35a8969d4a3472fe9f658b8c6f768d8613d9576101e060d547d6b34c1
                                                          • Instruction Fuzzy Hash: 96118EB218021DBEEF619E64CC85EE77F6DFF18798F004110BB18E2190CA769C61DBA4
                                                          APIs
                                                            • Part of subcall function 007AD7A3: _free.LIBCMT ref: 007AD7CC
                                                          • _free.LIBCMT ref: 007AD82D
                                                            • Part of subcall function 007A29C8: HeapFree.KERNEL32(00000000,00000000,?,007AD7D1,00000000,00000000,00000000,00000000,?,007AD7F8,00000000,00000007,00000000,?,007ADBF5,00000000), ref: 007A29DE
                                                            • Part of subcall function 007A29C8: GetLastError.KERNEL32(00000000,?,007AD7D1,00000000,00000000,00000000,00000000,?,007AD7F8,00000000,00000007,00000000,?,007ADBF5,00000000,00000000), ref: 007A29F0
                                                          • _free.LIBCMT ref: 007AD838
                                                          • _free.LIBCMT ref: 007AD843
                                                          • _free.LIBCMT ref: 007AD897
                                                          • _free.LIBCMT ref: 007AD8A2
                                                          • _free.LIBCMT ref: 007AD8AD
                                                          • _free.LIBCMT ref: 007AD8B8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                          • Instruction ID: 02719992826948fe385c18085575b22d030f6fab895d37a595332b07766ef863
                                                          • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                          • Instruction Fuzzy Hash: 09115171540B04EAD531BFB0CC4FFCB7BDC6F82700F400A25B29AA68B3DA6DB9064A51
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 007DDA74
                                                          • LoadStringW.USER32(00000000), ref: 007DDA7B
                                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 007DDA91
                                                          • LoadStringW.USER32(00000000), ref: 007DDA98
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 007DDADC
                                                          Strings
                                                          • %s (%d) : ==> %s: %s %s, xrefs: 007DDAB9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message
                                                          • String ID: %s (%d) : ==> %s: %s %s
                                                          • API String ID: 4072794657-3128320259
                                                          • Opcode ID: 7ff13fe97245a2471109bbdf93d71f2eda4bcfcf605ee0627e59ec4c21ac8489
                                                          • Instruction ID: ba571193234c5bb2440b917cbf6c6292c4cd4f977a974b9c7bd8d012b11d297e
                                                          • Opcode Fuzzy Hash: 7ff13fe97245a2471109bbdf93d71f2eda4bcfcf605ee0627e59ec4c21ac8489
                                                          • Instruction Fuzzy Hash: 4E016DF6900208BFE750ABE4DD89EEB376CFB08301F404596B716E2181EA749E848F74
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(0109C7E8,0109C7E8), ref: 007E097B
                                                          • EnterCriticalSection.KERNEL32(0109C7C8,00000000), ref: 007E098D
                                                          • TerminateThread.KERNEL32(?,000001F6), ref: 007E099B
                                                          • WaitForSingleObject.KERNEL32(?,000003E8), ref: 007E09A9
                                                          • CloseHandle.KERNEL32(?), ref: 007E09B8
                                                          • InterlockedExchange.KERNEL32(0109C7E8,000001F6), ref: 007E09C8
                                                          • LeaveCriticalSection.KERNEL32(0109C7C8), ref: 007E09CF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 3495660284-0
                                                          • Opcode ID: c36fb211e4e5b44a64a8310c2f8f4ebf5bd6016e0f9829765942b91a707b307e
                                                          • Instruction ID: 5f51cf2bb656bb407a6150a7b42f6437b7232a0fec0da32fd610e877a689af47
                                                          • Opcode Fuzzy Hash: c36fb211e4e5b44a64a8310c2f8f4ebf5bd6016e0f9829765942b91a707b307e
                                                          • Instruction Fuzzy Hash: 4CF0EC32542A12BBD7915FA4EE8DBD6BB39FF05702F402225F20290CB1C775A465CF90
                                                          APIs
                                                          • GetClientRect.USER32(?,?), ref: 00775D30
                                                          • GetWindowRect.USER32(?,?), ref: 00775D71
                                                          • ScreenToClient.USER32(?,?), ref: 00775D99
                                                          • GetClientRect.USER32(?,?), ref: 00775ED7
                                                          • GetWindowRect.USER32(?,?), ref: 00775EF8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Rect$Client$Window$Screen
                                                          • String ID:
                                                          • API String ID: 1296646539-0
                                                          • Opcode ID: 60d08f0a0765277af2723e5f5a5e2232428ee9a27382e5a3e087ad996613fe42
                                                          • Instruction ID: 4bd262ab035e0e9c193a9b83b4136b3e2b4a9ba15b1e3fa01fa1e9c15c9a5558
                                                          • Opcode Fuzzy Hash: 60d08f0a0765277af2723e5f5a5e2232428ee9a27382e5a3e087ad996613fe42
                                                          • Instruction Fuzzy Hash: 27B16735A00A4ADBDF10CFA9C4807EEB7F1FF58310F14851AE8A9D7250DB78AA51DB54
                                                          APIs
                                                          • __allrem.LIBCMT ref: 007A00BA
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007A00D6
                                                          • __allrem.LIBCMT ref: 007A00ED
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007A010B
                                                          • __allrem.LIBCMT ref: 007A0122
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007A0140
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                          • String ID:
                                                          • API String ID: 1992179935-0
                                                          • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                          • Instruction ID: c9ae4a97023d90d9e11598753216e139716703e96f8a6f7f513c048c0da459c7
                                                          • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                          • Instruction Fuzzy Hash: 7081F776A00706DBEB249F68DC45BAF73E9AF82324F24473AF551D7681E778D9008B90
                                                          APIs
                                                            • Part of subcall function 007F3149: select.WSOCK32(00000000,?,00000000,00000000,?,?,?,00000000,?,?,?,007F101C,00000000,?,?,00000000), ref: 007F3195
                                                          • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 007F1DC0
                                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 007F1DE1
                                                          • WSAGetLastError.WSOCK32 ref: 007F1DF2
                                                          • inet_ntoa.WSOCK32(?), ref: 007F1E8C
                                                          • htons.WSOCK32(?,?,?,?,?), ref: 007F1EDB
                                                          • _strlen.LIBCMT ref: 007F1F35
                                                            • Part of subcall function 007D39E8: _strlen.LIBCMT ref: 007D39F2
                                                            • Part of subcall function 00776D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,0078CF58,?,?,?), ref: 00776DBA
                                                            • Part of subcall function 00776D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,0078CF58,?,?,?), ref: 00776DED
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                          • String ID:
                                                          • API String ID: 1923757996-0
                                                          • Opcode ID: ce6878b92e245ffd059134ec5adf530a9d343f64fb2939e7556a2dc861a1e7b4
                                                          • Instruction ID: bb27389a837600b7cbd37da8616911c66ed61e2e1e4176e3862ca8011b4fd53e
                                                          • Opcode Fuzzy Hash: ce6878b92e245ffd059134ec5adf530a9d343f64fb2939e7556a2dc861a1e7b4
                                                          • Instruction Fuzzy Hash: 4DA1BD30204344EFC724EB24C889E3A77E5AF84318F94895CF55A5B3A2CB39ED46CB91
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,007982D9,007982D9,?,?,?,007A644F,00000001,00000001,8BE85006), ref: 007A6258
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,007A644F,00000001,00000001,8BE85006,?,?,?), ref: 007A62DE
                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 007A63D8
                                                          • __freea.LIBCMT ref: 007A63E5
                                                            • Part of subcall function 007A3820: RtlAllocateHeap.NTDLL(00000000,?,00841444,?,0078FDF5,?,?,0077A976,00000010,00841440,007713FC,?,007713C6,?,00771129), ref: 007A3852
                                                          • __freea.LIBCMT ref: 007A63EE
                                                          • __freea.LIBCMT ref: 007A6413
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1414292761-0
                                                          • Opcode ID: 176367618619b9171a9d67ee8b7ad6ee2df3ea7d1265bf08a22aa4bd054bb41a
                                                          • Instruction ID: 5d34cf38f3639ee653999e371596efb7b7e1f2d9bb28180881e4d65ee4b7d850
                                                          • Opcode Fuzzy Hash: 176367618619b9171a9d67ee8b7ad6ee2df3ea7d1265bf08a22aa4bd054bb41a
                                                          • Instruction Fuzzy Hash: 2251A172A00216EBEF258F64DC85EAF77AAEF86750F194729FD05D6180DB38DC41C6A0
                                                          APIs
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                            • Part of subcall function 007FC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007FB6AE,?,?), ref: 007FC9B5
                                                            • Part of subcall function 007FC998: _wcslen.LIBCMT ref: 007FC9F1
                                                            • Part of subcall function 007FC998: _wcslen.LIBCMT ref: 007FCA68
                                                            • Part of subcall function 007FC998: _wcslen.LIBCMT ref: 007FCA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007FBCCA
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007FBD25
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 007FBD6A
                                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 007FBD99
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 007FBDF3
                                                          • RegCloseKey.ADVAPI32(?), ref: 007FBDFF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                          • String ID:
                                                          • API String ID: 1120388591-0
                                                          • Opcode ID: 26397337874a83548e9f318f8854215fa7efb974a212fccb75af3e01f8c54418
                                                          • Instruction ID: 404891cf0069bb1e44e287fbcbb6d8723900bbfa1de59cd1a565360bca906420
                                                          • Opcode Fuzzy Hash: 26397337874a83548e9f318f8854215fa7efb974a212fccb75af3e01f8c54418
                                                          • Instruction Fuzzy Hash: EC819D30208245EFD714DF24C895E2ABBE5FF84348F14896CF6598B2A2DB35ED45CB92
                                                          APIs
                                                          • VariantInit.OLEAUT32(00000035), ref: 007CF7B9
                                                          • SysAllocString.OLEAUT32(00000001), ref: 007CF860
                                                          • VariantCopy.OLEAUT32(007CFA64,00000000), ref: 007CF889
                                                          • VariantClear.OLEAUT32(007CFA64), ref: 007CF8AD
                                                          • VariantCopy.OLEAUT32(007CFA64,00000000), ref: 007CF8B1
                                                          • VariantClear.OLEAUT32(?), ref: 007CF8BB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCopy$AllocInitString
                                                          • String ID:
                                                          • API String ID: 3859894641-0
                                                          • Opcode ID: dc8e1de0378a34042fb1c1d2accfb0e6e72e528f44aef2a6d02fdb790faba046
                                                          • Instruction ID: ba2a089410a69107af2d459f705efd79bf2c84254d6feecda9b4f54cb59e2c31
                                                          • Opcode Fuzzy Hash: dc8e1de0378a34042fb1c1d2accfb0e6e72e528f44aef2a6d02fdb790faba046
                                                          • Instruction Fuzzy Hash: B2519231601310EBCF24AB65D899F29B3E6EF45710B24946FE906DF291DB789C40C7A7
                                                          APIs
                                                            • Part of subcall function 00777620: _wcslen.LIBCMT ref: 00777625
                                                            • Part of subcall function 00776B57: _wcslen.LIBCMT ref: 00776B6A
                                                          • GetOpenFileNameW.COMDLG32(00000058), ref: 007E94E5
                                                          • _wcslen.LIBCMT ref: 007E9506
                                                          • _wcslen.LIBCMT ref: 007E952D
                                                          • GetSaveFileNameW.COMDLG32(00000058), ref: 007E9585
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$FileName$OpenSave
                                                          • String ID: X
                                                          • API String ID: 83654149-3081909835
                                                          • Opcode ID: f9bc8124cf7570a21f0e0c326b55a93790650b3890cd22a2b9003b23c30bb808
                                                          • Instruction ID: 180ed4ac0e37042102b44ac71bda2d9b3609b42444c41c54e3e49a5d15091993
                                                          • Opcode Fuzzy Hash: f9bc8124cf7570a21f0e0c326b55a93790650b3890cd22a2b9003b23c30bb808
                                                          • Instruction Fuzzy Hash: EBE1D231505340DFDB24DF25C885A6AB7E4FF89354F04896CFA899B2A2DB38DD05CB92
                                                          APIs
                                                            • Part of subcall function 00789BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00789BB2
                                                          • BeginPaint.USER32(?,?,?), ref: 00789241
                                                          • GetWindowRect.USER32(?,?), ref: 007892A5
                                                          • ScreenToClient.USER32(?,?), ref: 007892C2
                                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 007892D3
                                                          • EndPaint.USER32(?,?,?,?,?), ref: 00789321
                                                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 007C71EA
                                                            • Part of subcall function 00789339: BeginPath.GDI32(00000000), ref: 00789357
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                          • String ID:
                                                          • API String ID: 3050599898-0
                                                          • Opcode ID: 7c29c1c05485163a5829553acb9e5498da4482fd506a64056e8ea0eababe3fd7
                                                          • Instruction ID: 26f2bf16f0176c98dec9f9fab21599ea72da241907e367d46fea0976b288b7d4
                                                          • Opcode Fuzzy Hash: 7c29c1c05485163a5829553acb9e5498da4482fd506a64056e8ea0eababe3fd7
                                                          • Instruction Fuzzy Hash: B2419170144200EFDB21EF64DC88FBA7BA8FB96320F18026DFA65871E1C7759845DB61
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 007E080C
                                                          • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 007E0847
                                                          • EnterCriticalSection.KERNEL32(?), ref: 007E0863
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 007E08DC
                                                          • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 007E08F3
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 007E0921
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                          • String ID:
                                                          • API String ID: 3368777196-0
                                                          • Opcode ID: 3cccac9c8011f2c0d39c177205dca2b91cf0721b0518682c96591f78abfbdb02
                                                          • Instruction ID: 7e590aac10305219d3630acc93683b76694e877a2fb1cf9044acaf79c43b5f1e
                                                          • Opcode Fuzzy Hash: 3cccac9c8011f2c0d39c177205dca2b91cf0721b0518682c96591f78abfbdb02
                                                          • Instruction Fuzzy Hash: EB418B71900205EFDF14AF64DC85AAA77B8FF48310F1440A9ED009E297DB74EEA1DBA0
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,007CF3AB,00000000,?,?,00000000,?,007C682C,00000004,00000000,00000000), ref: 0080824C
                                                          • EnableWindow.USER32(?,00000000), ref: 00808272
                                                          • ShowWindow.USER32(FFFFFFFF,00000000), ref: 008082D1
                                                          • ShowWindow.USER32(?,00000004), ref: 008082E5
                                                          • EnableWindow.USER32(?,00000001), ref: 0080830B
                                                          • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0080832F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Show$Enable$MessageSend
                                                          • String ID:
                                                          • API String ID: 642888154-0
                                                          • Opcode ID: 926eacac7f446af00b429e2562f866ac3ac734dcc1995191caf41922a6255316
                                                          • Instruction ID: 722aeadc51a873c9d0de98be93072591190751724db0010f2d532ee09b9407ca
                                                          • Opcode Fuzzy Hash: 926eacac7f446af00b429e2562f866ac3ac734dcc1995191caf41922a6255316
                                                          • Instruction Fuzzy Hash: AF417434601644EFDFA5CF25CC99BA47FE1FB4A714F194269E5488B2E2CB31A8C1CB51
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 007D4C95
                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 007D4CB2
                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 007D4CEA
                                                          • _wcslen.LIBCMT ref: 007D4D08
                                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 007D4D10
                                                          • _wcsstr.LIBVCRUNTIME ref: 007D4D1A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                          • String ID:
                                                          • API String ID: 72514467-0
                                                          • Opcode ID: 78c57d540dd8a2330fb4b9fced04942c59367db40248f13601ef1e4968e61642
                                                          • Instruction ID: f29dad7d0cfa0c5bb51720e9f3eb44a252e6f4bcb0bc8a86d19fc32c7b04d132
                                                          • Opcode Fuzzy Hash: 78c57d540dd8a2330fb4b9fced04942c59367db40248f13601ef1e4968e61642
                                                          • Instruction Fuzzy Hash: 69210732204200BBEB655B35EC49E7B7BADDF45750F10406EF909CA291EA79DC4187A0
                                                          APIs
                                                            • Part of subcall function 00773AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00773A97,?,?,00772E7F,?,?,?,00000000), ref: 00773AC2
                                                          • _wcslen.LIBCMT ref: 007E587B
                                                          • CoInitialize.OLE32(00000000), ref: 007E5995
                                                          • CoCreateInstance.OLE32(0080FCF8,00000000,00000001,0080FB68,?), ref: 007E59AE
                                                          • CoUninitialize.OLE32 ref: 007E59CC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 3172280962-24824748
                                                          • Opcode ID: 3e4c6aa7b922fa20a524643530bb4bead67332fb2a42208f108df3ffdb3f8f5c
                                                          • Instruction ID: dd52c895922e58a8b57bc0a09d399958317205b287807adfb20a457b2a67c800
                                                          • Opcode Fuzzy Hash: 3e4c6aa7b922fa20a524643530bb4bead67332fb2a42208f108df3ffdb3f8f5c
                                                          • Instruction Fuzzy Hash: 4CD16371604605DFCB14DF25C484A2ABBE1FF89718F14895DF8899B362DB39EC05CB92
                                                          APIs
                                                            • Part of subcall function 007D0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007D0FCA
                                                            • Part of subcall function 007D0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007D0FD6
                                                            • Part of subcall function 007D0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 007D0FE5
                                                            • Part of subcall function 007D0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 007D0FEC
                                                            • Part of subcall function 007D0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 007D1002
                                                          • GetLengthSid.ADVAPI32(?,00000000,007D1335), ref: 007D17AE
                                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 007D17BA
                                                          • HeapAlloc.KERNEL32(00000000), ref: 007D17C1
                                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 007D17DA
                                                          • GetProcessHeap.KERNEL32(00000000,00000000,007D1335), ref: 007D17EE
                                                          • HeapFree.KERNEL32(00000000), ref: 007D17F5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                          • String ID:
                                                          • API String ID: 3008561057-0
                                                          • Opcode ID: 8e30fa4058292ff87beac26d8b2bf40f8164461ce78db7f87ef756ffd8219f2a
                                                          • Instruction ID: 8216fee64d2321a73b8d7320e582243faff81785743346eb81110a1bd50b07a7
                                                          • Opcode Fuzzy Hash: 8e30fa4058292ff87beac26d8b2bf40f8164461ce78db7f87ef756ffd8219f2a
                                                          • Instruction Fuzzy Hash: 56119072601605FFDB109FA4CC49BAF7BB9FF45365F50821AF44197220D739A944CB60
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 007D14FF
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 007D1506
                                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 007D1515
                                                          • CloseHandle.KERNEL32(00000004), ref: 007D1520
                                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 007D154F
                                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 007D1563
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                          • String ID:
                                                          • API String ID: 1413079979-0
                                                          • Opcode ID: b4daa9596abf9807fc82cd77fecb66e03f03b4f8584a1e9a884743f1fd25d78d
                                                          • Instruction ID: 35f1a4b960a736a6dce157d45c5ff8e32878091b448a54f6482036f9cf62ee4a
                                                          • Opcode Fuzzy Hash: b4daa9596abf9807fc82cd77fecb66e03f03b4f8584a1e9a884743f1fd25d78d
                                                          • Instruction Fuzzy Hash: FB112972500249BBDF118F98ED49BDE7BB9FF48744F048115FA05A21A0C3798E60DB60
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,00793379,00792FE5), ref: 00793390
                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0079339E
                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 007933B7
                                                          • SetLastError.KERNEL32(00000000,?,00793379,00792FE5), ref: 00793409
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastValue___vcrt_
                                                          • String ID:
                                                          • API String ID: 3852720340-0
                                                          • Opcode ID: a3e10b76793edced195b73ba5c34195ea1a451e476bed29504a168faaf81e202
                                                          • Instruction ID: 7ddd15da9a505170ec9fd51667538ab2a94b2bef57ae35c8e2f58ca1ca3d59a4
                                                          • Opcode Fuzzy Hash: a3e10b76793edced195b73ba5c34195ea1a451e476bed29504a168faaf81e202
                                                          • Instruction Fuzzy Hash: FD01423320D711FFEF2827B4BC8AA273AA4FB453793200329F810942F0EF194E025244
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,007A5686,007B3CD6,?,00000000,?,007A5B6A,?,?,?,?,?,0079E6D1,?,00838A48), ref: 007A2D78
                                                          • _free.LIBCMT ref: 007A2DAB
                                                          • _free.LIBCMT ref: 007A2DD3
                                                          • SetLastError.KERNEL32(00000000,?,?,?,?,0079E6D1,?,00838A48,00000010,00774F4A,?,?,00000000,007B3CD6), ref: 007A2DE0
                                                          • SetLastError.KERNEL32(00000000,?,?,?,?,0079E6D1,?,00838A48,00000010,00774F4A,?,?,00000000,007B3CD6), ref: 007A2DEC
                                                          • _abort.LIBCMT ref: 007A2DF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free$_abort
                                                          • String ID:
                                                          • API String ID: 3160817290-0
                                                          • Opcode ID: 4c54807185fd91b9d966dda554eaba078010055b66e1ed5d38db4874c7aabdfe
                                                          • Instruction ID: 96efebe1fc3f178a54dd85c4802ba8ccdd2e483d2e711e889ae23912be0ede1f
                                                          • Opcode Fuzzy Hash: 4c54807185fd91b9d966dda554eaba078010055b66e1ed5d38db4874c7aabdfe
                                                          • Instruction Fuzzy Hash: EEF04435745600BBC6622B3DBC0EB5F265ABFC37A5B254718F824A22E7EE2C98035561
                                                          APIs
                                                            • Part of subcall function 00789639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00789693
                                                            • Part of subcall function 00789639: SelectObject.GDI32(?,00000000), ref: 007896A2
                                                            • Part of subcall function 00789639: BeginPath.GDI32(?), ref: 007896B9
                                                            • Part of subcall function 00789639: SelectObject.GDI32(?,00000000), ref: 007896E2
                                                          • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00808A4E
                                                          • LineTo.GDI32(?,00000003,00000000), ref: 00808A62
                                                          • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00808A70
                                                          • LineTo.GDI32(?,00000000,00000003), ref: 00808A80
                                                          • EndPath.GDI32(?), ref: 00808A90
                                                          • StrokePath.GDI32(?), ref: 00808AA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                          • String ID:
                                                          • API String ID: 43455801-0
                                                          • Opcode ID: 83d2f03fae16fdd0ebad1ff2a20d9e3bc20ddd3c8392b1aa5c17f5b3a207ec8d
                                                          • Instruction ID: 63c2c519418fcacb00b687d9aa2e14896b173125ac9b0b5f0ff1e01f8f0b142e
                                                          • Opcode Fuzzy Hash: 83d2f03fae16fdd0ebad1ff2a20d9e3bc20ddd3c8392b1aa5c17f5b3a207ec8d
                                                          • Instruction Fuzzy Hash: 85110576000118FFEF129F90DC88EAA7F6CFB09390F048122FA199A1A1C7719D95DBA0
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 007D5218
                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 007D5229
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007D5230
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 007D5238
                                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 007D524F
                                                          • MulDiv.KERNEL32(000009EC,00000001,?), ref: 007D5261
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDevice$Release
                                                          • String ID:
                                                          • API String ID: 1035833867-0
                                                          • Opcode ID: 00fc89b46abee76f393d73428452de7dff3b46b859ebbe2b7d54f28046e71dc0
                                                          • Instruction ID: 9794c3cd7df37b18cafc1dc1580ef628998e73d8ab012fa4cf5d873191ad2f54
                                                          • Opcode Fuzzy Hash: 00fc89b46abee76f393d73428452de7dff3b46b859ebbe2b7d54f28046e71dc0
                                                          • Instruction Fuzzy Hash: 24014FB5A00718BBEB109FA69C49F5EBFB8FF58751F04416AFA04A7281D6709804CBA0
                                                          APIs
                                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00771BF4
                                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00771BFC
                                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00771C07
                                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00771C12
                                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00771C1A
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00771C22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Virtual
                                                          • String ID:
                                                          • API String ID: 4278518827-0
                                                          • Opcode ID: 597c9caf08662a6c1664f95c8440f9792825b5caab155ce74429315b07285ef1
                                                          • Instruction ID: a64ba736f5512c3ea5d4519b7c0216c2b7f1f0ec2945d27c873b399aa32ccac5
                                                          • Opcode Fuzzy Hash: 597c9caf08662a6c1664f95c8440f9792825b5caab155ce74429315b07285ef1
                                                          • Instruction Fuzzy Hash: E8016CB09027597DE3008F5A8C85B52FFA8FF19354F00411B915C47941C7F5A864CBE5
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 007DEB30
                                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 007DEB46
                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 007DEB55
                                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007DEB64
                                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007DEB6E
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007DEB75
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 839392675-0
                                                          • Opcode ID: c99d7120a758e0b7b167e11877910e5416fac8d3c5c78ee6ab666698e01abc56
                                                          • Instruction ID: 3156514a7fe21a42e1926eaf197d323ef0637b174ce669e6bac8f5d993eec8b8
                                                          • Opcode Fuzzy Hash: c99d7120a758e0b7b167e11877910e5416fac8d3c5c78ee6ab666698e01abc56
                                                          • Instruction Fuzzy Hash: 8BF09AB2200118BBE7615F629C0EEEF3A7CFFCAB11F000259F611D1190D7A11A01CAB4
                                                          APIs
                                                          • GetClientRect.USER32(?), ref: 007C7452
                                                          • SendMessageW.USER32(?,00001328,00000000,?), ref: 007C7469
                                                          • GetWindowDC.USER32(?), ref: 007C7475
                                                          • GetPixel.GDI32(00000000,?,?), ref: 007C7484
                                                          • ReleaseDC.USER32(?,00000000), ref: 007C7496
                                                          • GetSysColor.USER32(00000005), ref: 007C74B0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                          • String ID:
                                                          • API String ID: 272304278-0
                                                          • Opcode ID: 1a75cd415889bf9367babf61af8797693a6b2cc98fc623436cacac9331e7cc13
                                                          • Instruction ID: ad18c871a6db1eea7a341f0b84c1f94c406a05ab21954c30f9d44206fe58f093
                                                          • Opcode Fuzzy Hash: 1a75cd415889bf9367babf61af8797693a6b2cc98fc623436cacac9331e7cc13
                                                          • Instruction Fuzzy Hash: 7C014B32400615EFDBA55FA4DC09FAA7BB5FB04321F550268FE25A21A1CF351E51EF50
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 007D187F
                                                          • UnloadUserProfile.USERENV(?,?), ref: 007D188B
                                                          • CloseHandle.KERNEL32(?), ref: 007D1894
                                                          • CloseHandle.KERNEL32(?), ref: 007D189C
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 007D18A5
                                                          • HeapFree.KERNEL32(00000000), ref: 007D18AC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                          • String ID:
                                                          • API String ID: 146765662-0
                                                          • Opcode ID: d64ff9619ef108e377b894d90866d2802148d8c13358eb3ba45b5488ba7ab183
                                                          • Instruction ID: 4abff9b4fec3a941e952bdc5688e400b714a7a0c7ec15bb52a36c8c0f1217826
                                                          • Opcode Fuzzy Hash: d64ff9619ef108e377b894d90866d2802148d8c13358eb3ba45b5488ba7ab183
                                                          • Instruction Fuzzy Hash: A3E0E536104101BBDB415FA5ED0C90AFF39FF49B22B108320F225811B0CB329420DF90
                                                          APIs
                                                            • Part of subcall function 00790242: EnterCriticalSection.KERNEL32(0084070C,00841884,?,?,0078198B,00842518,?,?,?,007712F9,00000000), ref: 0079024D
                                                            • Part of subcall function 00790242: LeaveCriticalSection.KERNEL32(0084070C,?,0078198B,00842518,?,?,?,007712F9,00000000), ref: 0079028A
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                            • Part of subcall function 007900A3: __onexit.LIBCMT ref: 007900A9
                                                          • __Init_thread_footer.LIBCMT ref: 007F7BFB
                                                            • Part of subcall function 007901F8: EnterCriticalSection.KERNEL32(0084070C,?,?,00788747,00842514), ref: 00790202
                                                            • Part of subcall function 007901F8: LeaveCriticalSection.KERNEL32(0084070C,?,00788747,00842514), ref: 00790235
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                          • String ID: +T|$5$G$Variable must be of type 'Object'.
                                                          • API String ID: 535116098-3335344960
                                                          • Opcode ID: cce82671c1c456383cf52bf5ace40c790bca88ebc9c04cdbfa6816bc2e332ea5
                                                          • Instruction ID: 0ca0ddfc89f94571d24228b12794aa4b00f429adff306341417d7a92c0f77c4c
                                                          • Opcode Fuzzy Hash: cce82671c1c456383cf52bf5ace40c790bca88ebc9c04cdbfa6816bc2e332ea5
                                                          • Instruction Fuzzy Hash: 9C918970A04209EFCB08EF94D8959BDB7B5FF49300F508059FA169B392DB39AE41CB61
                                                          APIs
                                                            • Part of subcall function 00777620: _wcslen.LIBCMT ref: 00777625
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007DC6EE
                                                          • _wcslen.LIBCMT ref: 007DC735
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007DC79C
                                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 007DC7CA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info_wcslen$Default
                                                          • String ID: 0
                                                          • API String ID: 1227352736-4108050209
                                                          • Opcode ID: 3d610bf9b309ad86c64cfd70096645b63f2fc2c8a9e3cfdbbe5fd032f26a3263
                                                          • Instruction ID: c0f48a5671b43101aaa167c5036b4218f6e9b55d0108fb77d6d7c19aaf467993
                                                          • Opcode Fuzzy Hash: 3d610bf9b309ad86c64cfd70096645b63f2fc2c8a9e3cfdbbe5fd032f26a3263
                                                          • Instruction Fuzzy Hash: FD51C1716143029BDB169F28C889B6B7BF8EF45324F040A2AF995D33D0DB78D944DB52
                                                          APIs
                                                          • ShellExecuteExW.SHELL32(0000003C), ref: 007FAEA3
                                                            • Part of subcall function 00777620: _wcslen.LIBCMT ref: 00777625
                                                          • GetProcessId.KERNEL32(00000000), ref: 007FAF38
                                                          • CloseHandle.KERNEL32(00000000), ref: 007FAF67
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseExecuteHandleProcessShell_wcslen
                                                          • String ID: <$@
                                                          • API String ID: 146682121-1426351568
                                                          • Opcode ID: 50796369f7cfb0e43dee17b5d0653783a356b8fcd161cb1557e8cb3c8122f6b0
                                                          • Instruction ID: 3a92902881ff0de680464def16262cc7b004e7cee5f4a78042154485759730f0
                                                          • Opcode Fuzzy Hash: 50796369f7cfb0e43dee17b5d0653783a356b8fcd161cb1557e8cb3c8122f6b0
                                                          • Instruction Fuzzy Hash: 00713B71A00619EFCF14DF54C485AAEBBF0BF08314F148499E91AAB352D778ED45CB91
                                                          APIs
                                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 007D7206
                                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 007D723C
                                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 007D724D
                                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 007D72CF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                                          • String ID: DllGetClassObject
                                                          • API String ID: 753597075-1075368562
                                                          • Opcode ID: 6ee95752edcdee589797a6881c19e6ea5b075ed264f0b9ef7cbfccdde651330d
                                                          • Instruction ID: 62b65cc0759d927a7d773f914decee79051afe814485f3cace2a1fc8acc6bc66
                                                          • Opcode Fuzzy Hash: 6ee95752edcdee589797a6881c19e6ea5b075ed264f0b9ef7cbfccdde651330d
                                                          • Instruction Fuzzy Hash: B0415071604204EFDB19CF54C884A9A7BB9FF44320F1480AEBD059F34AE7B9E945DBA0
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00803E35
                                                          • IsMenu.USER32(?), ref: 00803E4A
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00803E92
                                                          • DrawMenuBar.USER32 ref: 00803EA5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$DrawInfoInsert
                                                          • String ID: 0
                                                          • API String ID: 3076010158-4108050209
                                                          • Opcode ID: 689cb3cc6c264c3a6a0905da2e9367bd17cee1acb188abffda1ef8e04ecce0d8
                                                          • Instruction ID: b663ce8748a81838dcf64989ae9ba262d1905129151a767cd66a8452ddd8bac5
                                                          • Opcode Fuzzy Hash: 689cb3cc6c264c3a6a0905da2e9367bd17cee1acb188abffda1ef8e04ecce0d8
                                                          • Instruction Fuzzy Hash: 22413779A01209EFEF50DF50DC84AAABBB9FF49354F044229E905E7690D730AE55CF60
                                                          APIs
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                            • Part of subcall function 007D3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007D3CCA
                                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 007D1E66
                                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 007D1E79
                                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 007D1EA9
                                                            • Part of subcall function 00776B57: _wcslen.LIBCMT ref: 00776B6A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_wcslen$ClassName
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 2081771294-1403004172
                                                          • Opcode ID: 7b56092df242291765157688868dee248c13668fdd1fd5a69ad7ea6e245c33db
                                                          • Instruction ID: eef8cc84ad2eb84c54a5ee5deef6efaf4ec8bc30c530cde91142dd7008209121
                                                          • Opcode Fuzzy Hash: 7b56092df242291765157688868dee248c13668fdd1fd5a69ad7ea6e245c33db
                                                          • Instruction Fuzzy Hash: CC212971A01104FEDF14AB64DC4ACFFB7B9EF56390B54411AF825A72E1DB3C4D068620
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                          • API String ID: 176396367-4004644295
                                                          • Opcode ID: cbef13ed76e84dfd629f50419a4968a18801a533ad8626df9d8745749d82d8c8
                                                          • Instruction ID: eccad16ae6052e1893c2d1b719da78ac17ec60a2952b78660c1d4d3c7d7a3170
                                                          • Opcode Fuzzy Hash: cbef13ed76e84dfd629f50419a4968a18801a533ad8626df9d8745749d82d8c8
                                                          • Instruction Fuzzy Hash: D0313673A0056D8BCB22DF6C9A514BE3391ABA1790F05C029EA15AB344FA79ED44D3A0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00802F8D
                                                          • LoadLibraryW.KERNEL32(?), ref: 00802F94
                                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00802FA9
                                                          • DestroyWindow.USER32(?), ref: 00802FB1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyLibraryLoadWindow
                                                          • String ID: SysAnimate32
                                                          • API String ID: 3529120543-1011021900
                                                          • Opcode ID: 210902bf59c907744e7f294da996048ffb87e59037252a82995af2639e35484c
                                                          • Instruction ID: 49ef316d1c9ff45377b5b370afec50379dac8d225b30f5cfa8c49870ab6fd68b
                                                          • Opcode Fuzzy Hash: 210902bf59c907744e7f294da996048ffb87e59037252a82995af2639e35484c
                                                          • Instruction Fuzzy Hash: D021AE7220020AABEF615F64DC88EBB77BDFB593A4F104218F950D21D0DBB1DC519760
                                                          APIs
                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00794D1E,007A28E9,?,00794CBE,007A28E9,008388B8,0000000C,00794E15,007A28E9,00000002), ref: 00794D8D
                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00794DA0
                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,00794D1E,007A28E9,?,00794CBE,007A28E9,008388B8,0000000C,00794E15,007A28E9,00000002,00000000), ref: 00794DC3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                          • String ID: CorExitProcess$mscoree.dll
                                                          • API String ID: 4061214504-1276376045
                                                          • Opcode ID: a7e7619a3b48e5e040eacfb429b7953d1efb48a235e03f5cf63a25cf635e1504
                                                          • Instruction ID: 3f18138b3d98369c65e0c432e76d903418205c6acf466a9af928a60c1871e2ae
                                                          • Opcode Fuzzy Hash: a7e7619a3b48e5e040eacfb429b7953d1efb48a235e03f5cf63a25cf635e1504
                                                          • Instruction Fuzzy Hash: 3EF04F34A41208BBDB519F90EC49BEDBBB9FF44752F0441A4F909A22A0DB795981CBD0
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00774EDD,?,00841418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00774E9C
                                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00774EAE
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00774EDD,?,00841418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00774EC0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                          • API String ID: 145871493-3689287502
                                                          • Opcode ID: 2ff981b08b2ea3d52181a78ccb08b2af6bfabac63e666112cd001008acc4434f
                                                          • Instruction ID: 40b888d46b0f54fa3787699410116bb85744b4737c20e7b7572991c96a502222
                                                          • Opcode Fuzzy Hash: 2ff981b08b2ea3d52181a78ccb08b2af6bfabac63e666112cd001008acc4434f
                                                          • Instruction Fuzzy Hash: D8E08C36A026226BD7B21F25AC18A6B7658FF82BB2B054215FC08E2240DBA8CD0180E0
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,007B3CDE,?,00841418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00774E62
                                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00774E74
                                                          • FreeLibrary.KERNEL32(00000000,?,?,007B3CDE,?,00841418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00774E87
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                          • API String ID: 145871493-1355242751
                                                          • Opcode ID: 9c16458add82b446c08ca0aa77c12f081f21f492eb7e531d32adec263db76760
                                                          • Instruction ID: 1d52a11079913a58d968c3356d326e5ecccc5e0b29387946ee90e4e555f3d555
                                                          • Opcode Fuzzy Hash: 9c16458add82b446c08ca0aa77c12f081f21f492eb7e531d32adec263db76760
                                                          • Instruction Fuzzy Hash: 13D0123650266157DBA21F256C18D8B7A1CFF86BB13054725B919E2254CFA8CD0186D0
                                                          APIs
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 007E2C05
                                                          • DeleteFileW.KERNEL32(?), ref: 007E2C87
                                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 007E2C9D
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 007E2CAE
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 007E2CC0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: File$Delete$Copy
                                                          • String ID:
                                                          • API String ID: 3226157194-0
                                                          • Opcode ID: 56dad6f4622cf2fa54724b58a10e27594bca93e7cc3cf97ca9aa05899eaa0762
                                                          • Instruction ID: 6fe3edda001dd157bdb6c2ed2d470487a4c136b2a98578ddfcf5a8513eff55da
                                                          • Opcode Fuzzy Hash: 56dad6f4622cf2fa54724b58a10e27594bca93e7cc3cf97ca9aa05899eaa0762
                                                          • Instruction Fuzzy Hash: 78B17FB1901119EBDF21EFA5CC89EDEB77DEF48340F1040A6F609E6152EA389A45CF61
                                                          APIs
                                                          • GetCurrentProcessId.KERNEL32 ref: 007FA427
                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 007FA435
                                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 007FA468
                                                          • CloseHandle.KERNEL32(?), ref: 007FA63D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseCountersCurrentHandleOpen
                                                          • String ID:
                                                          • API String ID: 3488606520-0
                                                          • Opcode ID: 198838c0feee181cbe9cb3ffa1dce3ab6700690b084eaa328f3c0a9be1e64189
                                                          • Instruction ID: ae19be6610a02564364421f06f2ac2e68f96504009372b18b2fc694c20f19843
                                                          • Opcode Fuzzy Hash: 198838c0feee181cbe9cb3ffa1dce3ab6700690b084eaa328f3c0a9be1e64189
                                                          • Instruction Fuzzy Hash: 3FA18FB1604301AFD720DF24C886F2AB7E5AF88714F14885DFA5E9B392D774EC418B92
                                                          APIs
                                                            • Part of subcall function 007DDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007DCF22,?), ref: 007DDDFD
                                                            • Part of subcall function 007DDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007DCF22,?), ref: 007DDE16
                                                            • Part of subcall function 007DE199: GetFileAttributesW.KERNEL32(?,007DCF95), ref: 007DE19A
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 007DE473
                                                          • MoveFileW.KERNEL32(?,?), ref: 007DE4AC
                                                          • _wcslen.LIBCMT ref: 007DE5EB
                                                          • _wcslen.LIBCMT ref: 007DE603
                                                          • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 007DE650
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                          • String ID:
                                                          • API String ID: 3183298772-0
                                                          • Opcode ID: 6322836d3a50dc576ecdcb008192ef7802ddc0f691902f9e048c08ade05378a8
                                                          • Instruction ID: 9377908495cf04251c7d5de0e2f04c03f2e2eb88c8affae56791ce24b8fdfb55
                                                          • Opcode Fuzzy Hash: 6322836d3a50dc576ecdcb008192ef7802ddc0f691902f9e048c08ade05378a8
                                                          • Instruction Fuzzy Hash: 6451A6B24087859BCB25EB94DC859DF73ECAF84340F00491FF689D7251EF38A5888766
                                                          APIs
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                            • Part of subcall function 007FC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007FB6AE,?,?), ref: 007FC9B5
                                                            • Part of subcall function 007FC998: _wcslen.LIBCMT ref: 007FC9F1
                                                            • Part of subcall function 007FC998: _wcslen.LIBCMT ref: 007FCA68
                                                            • Part of subcall function 007FC998: _wcslen.LIBCMT ref: 007FCA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007FBAA5
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007FBB00
                                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 007FBB63
                                                          • RegCloseKey.ADVAPI32(?,?), ref: 007FBBA6
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 007FBBB3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                          • String ID:
                                                          • API String ID: 826366716-0
                                                          • Opcode ID: 92e767e98979006c10327195f5062dfbd4fbf58d8b1b33522e6ba53345f805f8
                                                          • Instruction ID: 1183dd23a27f44f442aca19b203e2c05d21b4f505b8b012e86e1d5fcb157dbdc
                                                          • Opcode Fuzzy Hash: 92e767e98979006c10327195f5062dfbd4fbf58d8b1b33522e6ba53345f805f8
                                                          • Instruction Fuzzy Hash: C2619C71208205EFD714DF24C894E2ABBE5FF84348F14899CF5998B2A2CB35ED45CB92
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 007D8BCD
                                                          • VariantClear.OLEAUT32 ref: 007D8C3E
                                                          • VariantClear.OLEAUT32 ref: 007D8C9D
                                                          • VariantClear.OLEAUT32(?), ref: 007D8D10
                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 007D8D3B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$ChangeInitType
                                                          • String ID:
                                                          • API String ID: 4136290138-0
                                                          • Opcode ID: 6c024914d536ea22b77a9476ccce67a7054d740714e14cfbc5c8efddb69c1208
                                                          • Instruction ID: 3c81f42070c33a11dffe9c836f65603900f5068b8b52b2ac7ade25be92493aa7
                                                          • Opcode Fuzzy Hash: 6c024914d536ea22b77a9476ccce67a7054d740714e14cfbc5c8efddb69c1208
                                                          • Instruction Fuzzy Hash: 49516CB5A00619EFCB14CF68C884AAAB7F5FF8D310B15855AE919DB350E734E911CFA0
                                                          APIs
                                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 007E8BAE
                                                          • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 007E8BDA
                                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 007E8C32
                                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 007E8C57
                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 007E8C5F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfile$SectionWrite$String
                                                          • String ID:
                                                          • API String ID: 2832842796-0
                                                          • Opcode ID: fa4d130ba6480ba0764198a081ea39e60455f342a55c46c306d427be585278f2
                                                          • Instruction ID: 43784e5fbb8c9c344317ebcf1729be3b1fe59e0de77f7e516e1f94d508499c92
                                                          • Opcode Fuzzy Hash: fa4d130ba6480ba0764198a081ea39e60455f342a55c46c306d427be585278f2
                                                          • Instruction Fuzzy Hash: 6C515835A00214DFCB05DF65C885A69BBF1FF49354F18C498E809AB362CB39ED51CBA1
                                                          APIs
                                                          • LoadLibraryW.KERNEL32(?,00000000,?), ref: 007F8F40
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 007F8FD0
                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 007F8FEC
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 007F9032
                                                          • FreeLibrary.KERNEL32(00000000), ref: 007F9052
                                                            • Part of subcall function 0078F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,007E1043,?,753CE610), ref: 0078F6E6
                                                            • Part of subcall function 0078F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,007CFA64,00000000,00000000,?,?,007E1043,?,753CE610,?,007CFA64), ref: 0078F70D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                          • String ID:
                                                          • API String ID: 666041331-0
                                                          • Opcode ID: 5d34905bde46d72be1f9d3007c22473fa67f6c5555cb77bdbbd9bda6250d7808
                                                          • Instruction ID: d64c5551d48ff24fcafdf0adfd37585a2d9b55a84cc319d94f4c1520d2e595ee
                                                          • Opcode Fuzzy Hash: 5d34905bde46d72be1f9d3007c22473fa67f6c5555cb77bdbbd9bda6250d7808
                                                          • Instruction Fuzzy Hash: 6C515A34601209DFCB15DF58C4849ADBBF1FF49314F0881A8EA0AAB362DB35ED85CB91
                                                          APIs
                                                          • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00806C33
                                                          • SetWindowLongW.USER32(?,000000EC,?), ref: 00806C4A
                                                          • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00806C73
                                                          • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,007EAB79,00000000,00000000), ref: 00806C98
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00806CC7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$MessageSendShow
                                                          • String ID:
                                                          • API String ID: 3688381893-0
                                                          • Opcode ID: 7efe794f7d9ff5d7cd771c0599bd80367c14cde3d86e6e23b86f01131b5dc394
                                                          • Instruction ID: 8317c44e55974c26a52c7bd2f908e9f1a8e8499844aeea3b9971cddb2c036193
                                                          • Opcode Fuzzy Hash: 7efe794f7d9ff5d7cd771c0599bd80367c14cde3d86e6e23b86f01131b5dc394
                                                          • Instruction Fuzzy Hash: B241D735A04104AFEBA4CF28CC58FA57FA5FB09364F140228F895E72E0E771AD71CA40
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: 7af6dfb027e1e5c1b718f2a60c21cc5621d0113a3fa1de673ee64b0e27db2c15
                                                          • Instruction ID: 087a731b5b95f0bb436634307821a4dfa6d9c6f9e1b21896602173cff3a79bb1
                                                          • Opcode Fuzzy Hash: 7af6dfb027e1e5c1b718f2a60c21cc5621d0113a3fa1de673ee64b0e27db2c15
                                                          • Instruction Fuzzy Hash: A441E272A00204DFCB24DF7CC884A5EB7E5EFCA314F1546A9E515EB352DA35AD02CB81
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00789141
                                                          • ScreenToClient.USER32(00000000,?), ref: 0078915E
                                                          • GetAsyncKeyState.USER32(00000001), ref: 00789183
                                                          • GetAsyncKeyState.USER32(00000002), ref: 0078919D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: AsyncState$ClientCursorScreen
                                                          • String ID:
                                                          • API String ID: 4210589936-0
                                                          • Opcode ID: d54b8f9976e0dbe173dfdb39a5a80971e4e9695f01da10b73c48925bb9ccb833
                                                          • Instruction ID: e27dbe62dcea86c90faed0b25ca1cd100f9f2b3ef674ac0a14cc91a52b398830
                                                          • Opcode Fuzzy Hash: d54b8f9976e0dbe173dfdb39a5a80971e4e9695f01da10b73c48925bb9ccb833
                                                          • Instruction Fuzzy Hash: 0F415F31A0850AFBDF19AF68C848BFEB775FB45324F248219E525A72D0CB785950CF51
                                                          APIs
                                                          • GetInputState.USER32 ref: 007E38CB
                                                          • TranslateAcceleratorW.USER32(?,00000000,?), ref: 007E3922
                                                          • TranslateMessage.USER32(?), ref: 007E394B
                                                          • DispatchMessageW.USER32(?), ref: 007E3955
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 007E3966
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                          • String ID:
                                                          • API String ID: 2256411358-0
                                                          • Opcode ID: 9e61786be2f0897d81a10894c13d0692c18a7ed019c75deaca2522e799621f1a
                                                          • Instruction ID: f57492fb8e17b5d75de84101130227e603297f0ebc10e20e6a2f164d54c46840
                                                          • Opcode Fuzzy Hash: 9e61786be2f0897d81a10894c13d0692c18a7ed019c75deaca2522e799621f1a
                                                          • Instruction Fuzzy Hash: 3C31A8745063C59EEF35CB36984DBB677A8BB1A308F040569E466C3191D3BCB684CB21
                                                          APIs
                                                          • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,007EC21E,00000000), ref: 007ECF38
                                                          • InternetReadFile.WININET(?,00000000,?,?), ref: 007ECF6F
                                                          • GetLastError.KERNEL32(?,00000000,?,?,?,007EC21E,00000000), ref: 007ECFB4
                                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,007EC21E,00000000), ref: 007ECFC8
                                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,007EC21E,00000000), ref: 007ECFF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                          • String ID:
                                                          • API String ID: 3191363074-0
                                                          • Opcode ID: 4249b3f37a89526f0976537fe1045d83fb3c894c9867731af989a8b144182366
                                                          • Instruction ID: 941ac1a97fb9d939daf41e190f06700f580180a33ed2e9f440175cd046d91981
                                                          • Opcode Fuzzy Hash: 4249b3f37a89526f0976537fe1045d83fb3c894c9867731af989a8b144182366
                                                          • Instruction Fuzzy Hash: 48315E76601245EFDB21DFA6C884AABBBF9FF18351B10442EF506D2140DB38EE42DB60
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 007D1915
                                                          • PostMessageW.USER32(00000001,00000201,00000001), ref: 007D19C1
                                                          • Sleep.KERNEL32(00000000,?,?,?), ref: 007D19C9
                                                          • PostMessageW.USER32(00000001,00000202,00000000), ref: 007D19DA
                                                          • Sleep.KERNEL32(00000000,?,?,?,?), ref: 007D19E2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleep$RectWindow
                                                          • String ID:
                                                          • API String ID: 3382505437-0
                                                          • Opcode ID: 4434686aaca3ee97f4d3da1b8bede35b64063bc416ea7249c35dd597ecde3aae
                                                          • Instruction ID: ab2cc56cccd9ab05a5f5dcc8aaa117eb5d536f5ebdc614bdb7300cd72c080e74
                                                          • Opcode Fuzzy Hash: 4434686aaca3ee97f4d3da1b8bede35b64063bc416ea7249c35dd597ecde3aae
                                                          • Instruction Fuzzy Hash: 3C31AD71A00259EFCB10CFA8C9A9ADE3BB5FB04315F10432AF961A72D1C774A944CB90
                                                          APIs
                                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00805745
                                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 0080579D
                                                          • _wcslen.LIBCMT ref: 008057AF
                                                          • _wcslen.LIBCMT ref: 008057BA
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00805816
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_wcslen
                                                          • String ID:
                                                          • API String ID: 763830540-0
                                                          • Opcode ID: 48864edf65210128b16e075fc768571b49799f6ca2027bba1ea925dd9e95e168
                                                          • Instruction ID: 0e50bc16f76ab970cb655c912f118d02a810fc4b31d4578dc4a5496ab83be87b
                                                          • Opcode Fuzzy Hash: 48864edf65210128b16e075fc768571b49799f6ca2027bba1ea925dd9e95e168
                                                          • Instruction Fuzzy Hash: 8121A575905618EADFA09F60DC84AEF7BBCFF04324F108216E929EA1C0D7709985CF60
                                                          APIs
                                                          • IsWindow.USER32(00000000), ref: 007F0951
                                                          • GetForegroundWindow.USER32 ref: 007F0968
                                                          • GetDC.USER32(00000000), ref: 007F09A4
                                                          • GetPixel.GDI32(00000000,?,00000003), ref: 007F09B0
                                                          • ReleaseDC.USER32(00000000,00000003), ref: 007F09E8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ForegroundPixelRelease
                                                          • String ID:
                                                          • API String ID: 4156661090-0
                                                          • Opcode ID: e1c098e59b088ceeb782d41802a78e696c331e9dc46c1b9b23995234f567fe62
                                                          • Instruction ID: 4eb99b446bcb7f7e4adefc276bb9a5eaa21842787f6fdfaf3553dbdef9cd5148
                                                          • Opcode Fuzzy Hash: e1c098e59b088ceeb782d41802a78e696c331e9dc46c1b9b23995234f567fe62
                                                          • Instruction Fuzzy Hash: 4E216F36600204EFD754EF65C889AAEBBE5FF48744F04856CF95A97362DB74AC04CB90
                                                          APIs
                                                          • GetEnvironmentStringsW.KERNEL32 ref: 007ACDC6
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 007ACDE9
                                                            • Part of subcall function 007A3820: RtlAllocateHeap.NTDLL(00000000,?,00841444,?,0078FDF5,?,?,0077A976,00000010,00841440,007713FC,?,007713C6,?,00771129), ref: 007A3852
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 007ACE0F
                                                          • _free.LIBCMT ref: 007ACE22
                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 007ACE31
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                          • String ID:
                                                          • API String ID: 336800556-0
                                                          • Opcode ID: b883e5843d957beb00956f29ec07c2c564ebd10836ca6ca4466c57d0cb1cd594
                                                          • Instruction ID: 5bbb68770c762e2529442943ed1d2fe288886a00b4cbfaab8a1d07712ed32b4e
                                                          • Opcode Fuzzy Hash: b883e5843d957beb00956f29ec07c2c564ebd10836ca6ca4466c57d0cb1cd594
                                                          • Instruction Fuzzy Hash: DF0184726052157F67221BBA6C8CD7B796DEEC7BA1315032DF905D7201EA698D0281F0
                                                          APIs
                                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00789693
                                                          • SelectObject.GDI32(?,00000000), ref: 007896A2
                                                          • BeginPath.GDI32(?), ref: 007896B9
                                                          • SelectObject.GDI32(?,00000000), ref: 007896E2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: 4fdb220d318d866d079418bcfa0cc879064bd4d95a76d67a34d4f4982282261b
                                                          • Instruction ID: 94d7aa81b24c0d4797b169ce4b56f02b52f857038fae9f9716f168230f96ccd5
                                                          • Opcode Fuzzy Hash: 4fdb220d318d866d079418bcfa0cc879064bd4d95a76d67a34d4f4982282261b
                                                          • Instruction Fuzzy Hash: 11215E34942305EFDF11AF64EC18BB97FA8BB52365F54421AF520A61B0E3789892CF94
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: d7a8f6cd3159dd4140a7dcc17da5a8580c21dd718ef7c83d0703803843f78968
                                                          • Instruction ID: 0a426d7ef4d600d51cf6ecbceed8973d491474f4b5b8ecebc6c0d1c7e3796e84
                                                          • Opcode Fuzzy Hash: d7a8f6cd3159dd4140a7dcc17da5a8580c21dd718ef7c83d0703803843f78968
                                                          • Instruction Fuzzy Hash: 9E019661741615FBE61855109D46EBA737CEB213B4B604022FE149A781F66DED2086A0
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,?,0079F2DE,007A3863,00841444,?,0078FDF5,?,?,0077A976,00000010,00841440,007713FC,?,007713C6), ref: 007A2DFD
                                                          • _free.LIBCMT ref: 007A2E32
                                                          • _free.LIBCMT ref: 007A2E59
                                                          • SetLastError.KERNEL32(00000000,00771129), ref: 007A2E66
                                                          • SetLastError.KERNEL32(00000000,00771129), ref: 007A2E6F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free
                                                          • String ID:
                                                          • API String ID: 3170660625-0
                                                          • Opcode ID: 9943666229bda152216141da680649db98ac273ac8851679ca4c3b64537fc924
                                                          • Instruction ID: 3d9e6732031b9f38aa06c87d0d65b08e61cdd6819ee6984e1b5314137bdef32b
                                                          • Opcode Fuzzy Hash: 9943666229bda152216141da680649db98ac273ac8851679ca4c3b64537fc924
                                                          • Instruction Fuzzy Hash: C601F43220D600ABC6122B3D6C4EE2B2659BBD37B5B210728F425E22D3EB7CCC434521
                                                          APIs
                                                          • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,007CFF41,80070057,?,?,?,007D035E), ref: 007D002B
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007CFF41,80070057,?,?), ref: 007D0046
                                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007CFF41,80070057,?,?), ref: 007D0054
                                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007CFF41,80070057,?), ref: 007D0064
                                                          • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007CFF41,80070057,?,?), ref: 007D0070
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                                          • String ID:
                                                          • API String ID: 3897988419-0
                                                          • Opcode ID: 19fbb0ab669f3fdc800e7f0796e91f3f6839770747ae30fffac295c9dad81d46
                                                          • Instruction ID: 3249d05b095942cc10ee57f08cee91ba4c5fccdc7014119ac8f41d66f53f480f
                                                          • Opcode Fuzzy Hash: 19fbb0ab669f3fdc800e7f0796e91f3f6839770747ae30fffac295c9dad81d46
                                                          • Instruction Fuzzy Hash: 0501AD76600204BFDB504F68DC08BAA7AFDFF887A2F149225F905D2310E779DD409BA0
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 007DE997
                                                          • QueryPerformanceFrequency.KERNEL32(?), ref: 007DE9A5
                                                          • Sleep.KERNEL32(00000000), ref: 007DE9AD
                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 007DE9B7
                                                          • Sleep.KERNEL32 ref: 007DE9F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                                          • String ID:
                                                          • API String ID: 2833360925-0
                                                          • Opcode ID: 7f2b2205174d185bba5888747abda87285012c183c026e8bd30c069c7b529172
                                                          • Instruction ID: d2afc8331a2db4ca34c157ed580317439454614bf4a01d9d441dd66d34f3d1b6
                                                          • Opcode Fuzzy Hash: 7f2b2205174d185bba5888747abda87285012c183c026e8bd30c069c7b529172
                                                          • Instruction Fuzzy Hash: EB018C31D0262DDBCF41AFE4DC69AEDBB78FF08300F000656E502B6241DB38A551CBA2
                                                          APIs
                                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007D1114
                                                          • GetLastError.KERNEL32(?,00000000,00000000,?,?,007D0B9B,?,?,?), ref: 007D1120
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,007D0B9B,?,?,?), ref: 007D112F
                                                          • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,007D0B9B,?,?,?), ref: 007D1136
                                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007D114D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 842720411-0
                                                          • Opcode ID: 3b641a0bfe9cd87b085f77ce31bf2fd926614625304510d49654168c659b0117
                                                          • Instruction ID: 38c74eef03aa99571ffa5c7d95c78a88b2ca711be7cf14b243bbd205fd19e6b5
                                                          • Opcode Fuzzy Hash: 3b641a0bfe9cd87b085f77ce31bf2fd926614625304510d49654168c659b0117
                                                          • Instruction Fuzzy Hash: 2B013C75200209BFEB514FA9DC59E6A3F7EFF893A0B614519FA45D7360DB31DC009A60
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007D0FCA
                                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007D0FD6
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 007D0FE5
                                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 007D0FEC
                                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 007D1002
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: a24f92e4a45c2bc30e323423a9f00a8511a21e3d940f68b54a7296afa1aa1c46
                                                          • Instruction ID: 5bd5f9dffeb603b94ec853043cc70a03ae6c02a915903fa906f40cdab6358619
                                                          • Opcode Fuzzy Hash: a24f92e4a45c2bc30e323423a9f00a8511a21e3d940f68b54a7296afa1aa1c46
                                                          • Instruction Fuzzy Hash: 44F04935200301BBDB215FA4AC49F563BBDFF89762F514515FA45D62A1CA74DC408A60
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 007D102A
                                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 007D1036
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007D1045
                                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 007D104C
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007D1062
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: f51f1b8727a4d7c035d0922e36f4d0350d427937439dcf5e172280f8ec7bdf3a
                                                          • Instruction ID: 6e6f700b39effe1b44ac059c07e8973f5c372ffbf35aa545df4baa02f9155af6
                                                          • Opcode Fuzzy Hash: f51f1b8727a4d7c035d0922e36f4d0350d427937439dcf5e172280f8ec7bdf3a
                                                          • Instruction Fuzzy Hash: D1F0443A200301BBDB226FA4EC49F5A3BBEFF8A761F510515FA45C62A0CA74D8408A60
                                                          APIs
                                                          • CloseHandle.KERNEL32(?,?,?,?,007E017D,?,007E32FC,?,00000001,007B2592,?), ref: 007E0324
                                                          • CloseHandle.KERNEL32(?,?,?,?,007E017D,?,007E32FC,?,00000001,007B2592,?), ref: 007E0331
                                                          • CloseHandle.KERNEL32(?,?,?,?,007E017D,?,007E32FC,?,00000001,007B2592,?), ref: 007E033E
                                                          • CloseHandle.KERNEL32(?,?,?,?,007E017D,?,007E32FC,?,00000001,007B2592,?), ref: 007E034B
                                                          • CloseHandle.KERNEL32(?,?,?,?,007E017D,?,007E32FC,?,00000001,007B2592,?), ref: 007E0358
                                                          • CloseHandle.KERNEL32(?,?,?,?,007E017D,?,007E32FC,?,00000001,007B2592,?), ref: 007E0365
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle
                                                          • String ID:
                                                          • API String ID: 2962429428-0
                                                          • Opcode ID: cbe58d127241ca86b34a3736e1798663ee617fd43665f320920025b24dc4aa4e
                                                          • Instruction ID: 32c1e21aaef8f650c309f10ac36717999e135858d40e32789b7986eb3d09126b
                                                          • Opcode Fuzzy Hash: cbe58d127241ca86b34a3736e1798663ee617fd43665f320920025b24dc4aa4e
                                                          • Instruction Fuzzy Hash: 9401AE72802B559FCB30AF66D880812FBF9BF643153158A3FD19652931C3B5A998CF80
                                                          APIs
                                                          • _free.LIBCMT ref: 007AD752
                                                            • Part of subcall function 007A29C8: HeapFree.KERNEL32(00000000,00000000,?,007AD7D1,00000000,00000000,00000000,00000000,?,007AD7F8,00000000,00000007,00000000,?,007ADBF5,00000000), ref: 007A29DE
                                                            • Part of subcall function 007A29C8: GetLastError.KERNEL32(00000000,?,007AD7D1,00000000,00000000,00000000,00000000,?,007AD7F8,00000000,00000007,00000000,?,007ADBF5,00000000,00000000), ref: 007A29F0
                                                          • _free.LIBCMT ref: 007AD764
                                                          • _free.LIBCMT ref: 007AD776
                                                          • _free.LIBCMT ref: 007AD788
                                                          • _free.LIBCMT ref: 007AD79A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: a483ecdc4ee9bf8141c863139ff85c74ccb73295f3120bb2ef06c0cb0cc789ac
                                                          • Instruction ID: c0a2b5f5b2de809d1b9c21b6cb5455bfaca27207ff0037d034eeee9447499455
                                                          • Opcode Fuzzy Hash: a483ecdc4ee9bf8141c863139ff85c74ccb73295f3120bb2ef06c0cb0cc789ac
                                                          • Instruction Fuzzy Hash: E1F0FF32544208AF8665EB68F9C5C2B7BDDBBC6710B950E05F449F7922C728FC808B65
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 007D5C58
                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 007D5C6F
                                                          • MessageBeep.USER32(00000000), ref: 007D5C87
                                                          • KillTimer.USER32(?,0000040A), ref: 007D5CA3
                                                          • EndDialog.USER32(?,00000001), ref: 007D5CBD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                          • String ID:
                                                          • API String ID: 3741023627-0
                                                          • Opcode ID: 5bd36fa7d8a30cdc2a85de7fd1f856e91ace2555b94e03fff6d99afec10ce431
                                                          • Instruction ID: d800aef2a1353da5e87c2709b48745a8d904140523dd843432b6488c848f4b69
                                                          • Opcode Fuzzy Hash: 5bd36fa7d8a30cdc2a85de7fd1f856e91ace2555b94e03fff6d99afec10ce431
                                                          • Instruction Fuzzy Hash: E001D630500B04AFEB305F10DD4EFA67BB8BB10B41F04165EA597A11E1DBF5AD848AA0
                                                          APIs
                                                          • _free.LIBCMT ref: 007A22BE
                                                            • Part of subcall function 007A29C8: HeapFree.KERNEL32(00000000,00000000,?,007AD7D1,00000000,00000000,00000000,00000000,?,007AD7F8,00000000,00000007,00000000,?,007ADBF5,00000000), ref: 007A29DE
                                                            • Part of subcall function 007A29C8: GetLastError.KERNEL32(00000000,?,007AD7D1,00000000,00000000,00000000,00000000,?,007AD7F8,00000000,00000007,00000000,?,007ADBF5,00000000,00000000), ref: 007A29F0
                                                          • _free.LIBCMT ref: 007A22D0
                                                          • _free.LIBCMT ref: 007A22E3
                                                          • _free.LIBCMT ref: 007A22F4
                                                          • _free.LIBCMT ref: 007A2305
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 27622e7d41b7423a4c96e545da3248cb508fd18fad1c56581e37edc59267895f
                                                          • Instruction ID: 86bbd0ba95afcdc38507b468775d8ea838fa9b0049df72206a27f855bc058881
                                                          • Opcode Fuzzy Hash: 27622e7d41b7423a4c96e545da3248cb508fd18fad1c56581e37edc59267895f
                                                          • Instruction Fuzzy Hash: 81F05478400220CF8B52EF68BC0580A3B64F79BB51701071AF514E22F6CB3C1552EFE5
                                                          APIs
                                                          • EndPath.GDI32(?), ref: 007895D4
                                                          • StrokeAndFillPath.GDI32(?,?,007C71F7,00000000,?,?,?), ref: 007895F0
                                                          • SelectObject.GDI32(?,00000000), ref: 00789603
                                                          • DeleteObject.GDI32 ref: 00789616
                                                          • StrokePath.GDI32(?), ref: 00789631
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                                          • String ID:
                                                          • API String ID: 2625713937-0
                                                          • Opcode ID: d673a2649e0728f83cb29502c2718cef8285bd5eb098870f732684d8d4658240
                                                          • Instruction ID: 1422cd10c348e4a317eeb68d0315d6731017307ea9c1f011dff7358becc155f8
                                                          • Opcode Fuzzy Hash: d673a2649e0728f83cb29502c2718cef8285bd5eb098870f732684d8d4658240
                                                          • Instruction Fuzzy Hash: 00F03739046608EBDB226F69ED1CBB43F61BB02322F488314F529550F0D73489A1DF20
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: __freea$_free
                                                          • String ID: a/p$am/pm
                                                          • API String ID: 3432400110-3206640213
                                                          • Opcode ID: 3f352d53110a1cd50b202d4e30cd53b4f7e16d8a42e4084b624d88fc76321086
                                                          • Instruction ID: f0cf1be93f14e190d97668f6d62b9c117390c2b73266bad8eb17d0f18805b224
                                                          • Opcode Fuzzy Hash: 3f352d53110a1cd50b202d4e30cd53b4f7e16d8a42e4084b624d88fc76321086
                                                          • Instruction Fuzzy Hash: DDD1E535A00206DAEF289F68C855BFAB7B5FF87310FA84359E501AB650D37D9D80CB91
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: JOw
                                                          • API String ID: 0-1003251281
                                                          • Opcode ID: cb6c8b6347abe44b53fccb28e69b7513c3124af8ebf7bb48d5338d6512730b38
                                                          • Instruction ID: 2197b3d37ce754d676e0f2f95af56d543cc432ab668f694bf0ec9f006d0fcbef
                                                          • Opcode Fuzzy Hash: cb6c8b6347abe44b53fccb28e69b7513c3124af8ebf7bb48d5338d6512730b38
                                                          • Instruction Fuzzy Hash: 685191B5D0060AEFCF119FA4D849FAE7BB8AF86320F14025AF505A7292D63D9901CB71
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 007A8B6E
                                                          • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 007A8B7A
                                                          • __dosmaperr.LIBCMT ref: 007A8B81
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                          • String ID: .y
                                                          • API String ID: 2434981716-2155845462
                                                          • Opcode ID: c2200cbd0bd742554cd8f6e25a83331a8447c523ff747c59c82d9512fe5f263c
                                                          • Instruction ID: 2f69360c8797373c2d25d5b174fdfe9018e25f8c9424ab9cb781803ee4abaa41
                                                          • Opcode Fuzzy Hash: c2200cbd0bd742554cd8f6e25a83331a8447c523ff747c59c82d9512fe5f263c
                                                          • Instruction Fuzzy Hash: 6F418EF0604145AFCB649F64C884A7E7FA5EBC7300B2883A9F89587242DE39CC02C7A1
                                                          APIs
                                                            • Part of subcall function 007DB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007D21D0,?,?,00000034,00000800,?,00000034), ref: 007DB42D
                                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 007D2760
                                                            • Part of subcall function 007DB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007D21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 007DB3F8
                                                            • Part of subcall function 007DB32A: GetWindowThreadProcessId.USER32(?,?), ref: 007DB355
                                                            • Part of subcall function 007DB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,007D2194,00000034,?,?,00001004,00000000,00000000), ref: 007DB365
                                                            • Part of subcall function 007DB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,007D2194,00000034,?,?,00001004,00000000,00000000), ref: 007DB37B
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007D27CD
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007D281A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                          • String ID: @
                                                          • API String ID: 4150878124-2766056989
                                                          • Opcode ID: 0e6b5e6dfa26354228b79164b481d769afd6c1e9f4d3373152c90cbe37fa98f0
                                                          • Instruction ID: 200013a4a2f6cb827483f78adb66f2b079797bbb7c9d5c39fb7ece82850c796e
                                                          • Opcode Fuzzy Hash: 0e6b5e6dfa26354228b79164b481d769afd6c1e9f4d3373152c90cbe37fa98f0
                                                          • Instruction Fuzzy Hash: B3413C72900218EFDB10DFA4CD45AEEBBB8EF19300F00405AFA55B7281DB756E46DBA0
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 007A1769
                                                          • _free.LIBCMT ref: 007A1834
                                                          • _free.LIBCMT ref: 007A183E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$FileModuleName
                                                          • String ID: C:\Users\user\Desktop\file.exe
                                                          • API String ID: 2506810119-1957095476
                                                          • Opcode ID: bace9fbf73b93a7e852bf8734eb2f27f148b635018f7554afd11aff9ff71419f
                                                          • Instruction ID: 418c70beaf58d6a868683748a9614f48e6786b37f8f648d3f45a713ae06b0b05
                                                          • Opcode Fuzzy Hash: bace9fbf73b93a7e852bf8734eb2f27f148b635018f7554afd11aff9ff71419f
                                                          • Instruction Fuzzy Hash: CC319375A00218EFEB21DF99D889D9EBBFCEBC6320F504266F504D7211D6B88E40CB90
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 007DC306
                                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 007DC34C
                                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00841990,010A68D0), ref: 007DC395
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Delete$InfoItem
                                                          • String ID: 0
                                                          • API String ID: 135850232-4108050209
                                                          • Opcode ID: 1e78d72c106fe2a3b7c0c63bbb9b8f85de808a9b255c6389b7731be589a2bd84
                                                          • Instruction ID: 86f619cf4528184820e1ebe60e3c7cc4d9bdf9f2b5bce75795c62f7ad9cc56a2
                                                          • Opcode Fuzzy Hash: 1e78d72c106fe2a3b7c0c63bbb9b8f85de808a9b255c6389b7731be589a2bd84
                                                          • Instruction Fuzzy Hash: 68418E31204342DFDB25DF28D885B1ABBA4AF85310F10861EF9A5973D1D738A904CB62
                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0080CC08,00000000,?,?,?,?), ref: 008044AA
                                                          • GetWindowLongW.USER32 ref: 008044C7
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 008044D7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID: SysTreeView32
                                                          • API String ID: 847901565-1698111956
                                                          • Opcode ID: fd68822deb9dc0564f04f161bc605a4f4e4abc34974b63b9267b82947ff1f708
                                                          • Instruction ID: ecadae44e1b66756fc370c5684ccd17f2364bde0a395d17a3d0bc2def5e7f8e4
                                                          • Opcode Fuzzy Hash: fd68822deb9dc0564f04f161bc605a4f4e4abc34974b63b9267b82947ff1f708
                                                          • Instruction Fuzzy Hash: 72319C72240605ABDF609F38DC45BEA7BA9FB08324F205315FA79E22E0D774EC509750
                                                          APIs
                                                          • SysReAllocString.OLEAUT32(?,?), ref: 007D6EED
                                                          • VariantCopyInd.OLEAUT32(?,?), ref: 007D6F08
                                                          • VariantClear.OLEAUT32(?), ref: 007D6F12
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$AllocClearCopyString
                                                          • String ID: *j}
                                                          • API String ID: 2173805711-2067633288
                                                          • Opcode ID: cf15679027912b74ee4ee242db9c171de19661ed0cb63a37b45d8dc7b2cc9afc
                                                          • Instruction ID: 848710b8303ae7a5674785ae2fb1e4701d126311edf848b6893df1b757107c80
                                                          • Opcode Fuzzy Hash: cf15679027912b74ee4ee242db9c171de19661ed0cb63a37b45d8dc7b2cc9afc
                                                          • Instruction Fuzzy Hash: 6831E2B1604A05DFCF04AFA4E8959BE3776FF85B04B1044AAF8029B3A1C7389D11CBD0
                                                          APIs
                                                            • Part of subcall function 007F335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,007F3077,?,?), ref: 007F3378
                                                          • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 007F307A
                                                          • _wcslen.LIBCMT ref: 007F309B
                                                          • htons.WSOCK32(00000000,?,?,00000000), ref: 007F3106
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                          • String ID: 255.255.255.255
                                                          • API String ID: 946324512-2422070025
                                                          • Opcode ID: 36b076f095f84f93701cb02248fb7b05082cd5459b35c4526bd52b100eb41702
                                                          • Instruction ID: b3652a3fcb1cbc183b73ab3ca6a9dd4d0dc43254f3e4a36c125d00be6fda7011
                                                          • Opcode Fuzzy Hash: 36b076f095f84f93701cb02248fb7b05082cd5459b35c4526bd52b100eb41702
                                                          • Instruction Fuzzy Hash: 06310435200209DFCB10CF28C485EBA77E1EF14318F24C15AEA158B392DB3AEE45C761
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00803F40
                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00803F54
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00803F78
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window
                                                          • String ID: SysMonthCal32
                                                          • API String ID: 2326795674-1439706946
                                                          • Opcode ID: fe9faa6971e667075a43f654bef902d07aa60fb47a9ccf25710b40c1ad7a39c1
                                                          • Instruction ID: 324b1707abf3cbfea6fea625a6dce2e5a4f4eb623d9d6e6e66074f387e749d5f
                                                          • Opcode Fuzzy Hash: fe9faa6971e667075a43f654bef902d07aa60fb47a9ccf25710b40c1ad7a39c1
                                                          • Instruction Fuzzy Hash: 0E219C32600219BBDF219F54DC46FEA3B79FF48714F110214FA19AB1D0DAB5A991CBA0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00804705
                                                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00804713
                                                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0080471A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyWindow
                                                          • String ID: msctls_updown32
                                                          • API String ID: 4014797782-2298589950
                                                          • Opcode ID: a6d7f16ae5afbd830b0af0fe09c0d139a1a79caf2582739aeab63b73a78ce678
                                                          • Instruction ID: 7e3a9e06d1f7a0a364d4ae67dd05fa7adcc25af0c119885b7f49977d58e6e0da
                                                          • Opcode Fuzzy Hash: a6d7f16ae5afbd830b0af0fe09c0d139a1a79caf2582739aeab63b73a78ce678
                                                          • Instruction Fuzzy Hash: 9C215EF5600208AFEB50DF68DC95DA73BADFB5A394B040459FA11DB2A1DB31EC51CA60
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                          • API String ID: 176396367-2734436370
                                                          • Opcode ID: 200a0597f77ee0ee72a422b0f3c794b0be888ab508776a6b82292821aff6ecd5
                                                          • Instruction ID: 04c48fa2fbad06fc682b9634483d89c54863e6384238e1664177da982221e6f0
                                                          • Opcode Fuzzy Hash: 200a0597f77ee0ee72a422b0f3c794b0be888ab508776a6b82292821aff6ecd5
                                                          • Instruction Fuzzy Hash: 3B212632204511A6C731BA24AC16FA773B8AF51310F148027FB5A97282EB5DED51C395
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00803840
                                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00803850
                                                          • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00803876
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MoveWindow
                                                          • String ID: Listbox
                                                          • API String ID: 3315199576-2633736733
                                                          • Opcode ID: 2aa4f12bd5753fae0daf63eda6a47d045d1911e6d10013f9db221b986b784de8
                                                          • Instruction ID: f673254fb3fb6e1104bd7dd10ee5513b159e2538cfaed964673d99badbb4dad2
                                                          • Opcode Fuzzy Hash: 2aa4f12bd5753fae0daf63eda6a47d045d1911e6d10013f9db221b986b784de8
                                                          • Instruction Fuzzy Hash: 27218E72610218BBEF619F54CC85EAB376EFF89754F108124F9549B1D0CA71DC5287A0
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 007E4A08
                                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 007E4A5C
                                                          • SetErrorMode.KERNEL32(00000000,?,?,0080CC08), ref: 007E4AD0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume
                                                          • String ID: %lu
                                                          • API String ID: 2507767853-685833217
                                                          • Opcode ID: 84815949b249ad822608d144ffdc42783cfd2a5a2e8d3df802dc1ba350c016d2
                                                          • Instruction ID: dba0cda38dd96052e69cad7e81242a09cefd5085d1eb047348a0a991a78c4b11
                                                          • Opcode Fuzzy Hash: 84815949b249ad822608d144ffdc42783cfd2a5a2e8d3df802dc1ba350c016d2
                                                          • Instruction Fuzzy Hash: BF313E75A00109EFDB10DF64C885EAABBF8EF08318F1480A5E909DB352D775EE45CB61
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0080424F
                                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00804264
                                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00804271
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: msctls_trackbar32
                                                          • API String ID: 3850602802-1010561917
                                                          • Opcode ID: 5a316ccd7cd0f1c59ce88369033498a6771d80b3ed74d0b48a08a4862ac98136
                                                          • Instruction ID: c59b42e15a415e810b3f9ebc0f5569545fcc59493ec17101cb0c7827e9ba9ce0
                                                          • Opcode Fuzzy Hash: 5a316ccd7cd0f1c59ce88369033498a6771d80b3ed74d0b48a08a4862ac98136
                                                          • Instruction Fuzzy Hash: 6A11A371380248BEEF605F69CC06FAB3BACFF95B54F110528FA55E60D0D671D8619B50
                                                          APIs
                                                            • Part of subcall function 00776B57: _wcslen.LIBCMT ref: 00776B6A
                                                            • Part of subcall function 007D2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 007D2DC5
                                                            • Part of subcall function 007D2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 007D2DD6
                                                            • Part of subcall function 007D2DA7: GetCurrentThreadId.KERNEL32 ref: 007D2DDD
                                                            • Part of subcall function 007D2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 007D2DE4
                                                          • GetFocus.USER32 ref: 007D2F78
                                                            • Part of subcall function 007D2DEE: GetParent.USER32(00000000), ref: 007D2DF9
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 007D2FC3
                                                          • EnumChildWindows.USER32(?,007D303B), ref: 007D2FEB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                          • String ID: %s%d
                                                          • API String ID: 1272988791-1110647743
                                                          • Opcode ID: 7cf04cbbb8de9a0e245cc4df8c8b9dfe45b13c91ca65fd5deb3928637197ec9b
                                                          • Instruction ID: 6473c2ac3a812a5f69982c0ef89ca5327dedfa5aec417f6b66c743214117fe29
                                                          • Opcode Fuzzy Hash: 7cf04cbbb8de9a0e245cc4df8c8b9dfe45b13c91ca65fd5deb3928637197ec9b
                                                          • Instruction Fuzzy Hash: 1111E7B1300205ABCF547F708C89EED377AAFA4304F048076F9199B393DE395A0A8B60
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008058C1
                                                          • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008058EE
                                                          • DrawMenuBar.USER32(?), ref: 008058FD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$InfoItem$Draw
                                                          • String ID: 0
                                                          • API String ID: 3227129158-4108050209
                                                          • Opcode ID: 3d7db58b7d217da41be90368b2c3c45b879ee359246ed12289f8d2ee57200d03
                                                          • Instruction ID: dce3182987a3c75eb38f77018d9fa01c68bc0a0ac598287aa0d8178d93bde1b7
                                                          • Opcode Fuzzy Hash: 3d7db58b7d217da41be90368b2c3c45b879ee359246ed12289f8d2ee57200d03
                                                          • Instruction Fuzzy Hash: 0E016935500218EFDBA19F11EC48BAFBBB4FB45361F1080A9E849D61A1DB308A94EF31
                                                          APIs
                                                          • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 007CD3BF
                                                          • FreeLibrary.KERNEL32 ref: 007CD3E5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressFreeLibraryProc
                                                          • String ID: GetSystemWow64DirectoryW$X64
                                                          • API String ID: 3013587201-2590602151
                                                          • Opcode ID: 46aa0cc3841b48c50d61d5b1338fcb270a5d55cfe12d73ee63b9dee36d9d4e08
                                                          • Instruction ID: 7be1d7a15146643ac97978f4d0a8ba822cdaade851a42881638bd14e1e6947ce
                                                          • Opcode Fuzzy Hash: 46aa0cc3841b48c50d61d5b1338fcb270a5d55cfe12d73ee63b9dee36d9d4e08
                                                          • Instruction Fuzzy Hash: 2CF05572806A219BD7B12B204C24F2A7710FF22B20F69437CE002E21C0E72CCC4483C2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0a26b88804aa211f9131dc5a6e7b0d949350f547b2ab757de119e6616940252f
                                                          • Instruction ID: 61faf3e71c389e056894841d1e97a38d02db9b000f37ed248b13321e52b9f1e8
                                                          • Opcode Fuzzy Hash: 0a26b88804aa211f9131dc5a6e7b0d949350f547b2ab757de119e6616940252f
                                                          • Instruction Fuzzy Hash: C9C14675A0020AEFCB14CFA8C898BAEB7B5FF48314F209599E505EB251D735EE41DB90
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInitInitializeUninitialize
                                                          • String ID:
                                                          • API String ID: 1998397398-0
                                                          • Opcode ID: 4db3ea8acf5b4115f3f6bd876793dae93cf19eec4c3730a37b30877a18f0e30b
                                                          • Instruction ID: 19d8fbc110c47408343986941de1749f278077ab6832f73d110947afc9488c11
                                                          • Opcode Fuzzy Hash: 4db3ea8acf5b4115f3f6bd876793dae93cf19eec4c3730a37b30877a18f0e30b
                                                          • Instruction Fuzzy Hash: 7BA13B75604204DFCB04EF24C489A2AB7E5FF88754F148959F98A9B362DB38EE01CB91
                                                          APIs
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0080FC08,?), ref: 007D05F0
                                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0080FC08,?), ref: 007D0608
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,0080CC40,000000FF,?,00000000,00000800,00000000,?,0080FC08,?), ref: 007D062D
                                                          • _memcmp.LIBVCRUNTIME ref: 007D064E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: FromProg$FreeTask_memcmp
                                                          • String ID:
                                                          • API String ID: 314563124-0
                                                          • Opcode ID: 7a33facda952a3c25e9510e7e229cde3f9646bbedd88d70212b23c92c2d03573
                                                          • Instruction ID: 5a67900edb2efc4000579d7750ff8ccaf2b950ee6e448423256dcedff53a710c
                                                          • Opcode Fuzzy Hash: 7a33facda952a3c25e9510e7e229cde3f9646bbedd88d70212b23c92c2d03573
                                                          • Instruction Fuzzy Hash: EF811B71A00109EFCB04DF94C988EEEB7B9FF89315F204559E506AB250DB75AE06CBA0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: 186428d6a2ab3b4d14cad0e14c4a20a623a74fe069604f6f70725b01109a0623
                                                          • Instruction ID: 09aae592ad197d860381111067ca6fb00e8a38cbb07c91f8e1e618f471b2b8c0
                                                          • Opcode Fuzzy Hash: 186428d6a2ab3b4d14cad0e14c4a20a623a74fe069604f6f70725b01109a0623
                                                          • Instruction Fuzzy Hash: C2412B31600140EBDF216BBD9C5ABEE3AA4FF86370FE44325F419D7192E63C49519762
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 008062E2
                                                          • ScreenToClient.USER32(?,?), ref: 00806315
                                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00806382
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientMoveRectScreen
                                                          • String ID:
                                                          • API String ID: 3880355969-0
                                                          • Opcode ID: 8b5b519e79f84c468d689108c9bda59c165dd87774973bad790dc09b07a98dd2
                                                          • Instruction ID: 1e329c5dcd27a396f108b4f7e94b2c79c17600b49e9b31eab064150fe4f38319
                                                          • Opcode Fuzzy Hash: 8b5b519e79f84c468d689108c9bda59c165dd87774973bad790dc09b07a98dd2
                                                          • Instruction Fuzzy Hash: 76511974A00209EFDF60DF68D884AAE7BB5FB45360F118259F815D7290E731ADA1CB90
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 007F1AFD
                                                          • WSAGetLastError.WSOCK32 ref: 007F1B0B
                                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 007F1B8A
                                                          • WSAGetLastError.WSOCK32 ref: 007F1B94
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$socket
                                                          • String ID:
                                                          • API String ID: 1881357543-0
                                                          • Opcode ID: 0b54ed27e286b39dd2fa0242d0344cfb47b0ec9ee94e83388a4dd7edde00f5d7
                                                          • Instruction ID: 7b1dce417f0eea99406208e30cdd90de697d2ea2c308a0af7647a74a54327d8c
                                                          • Opcode Fuzzy Hash: 0b54ed27e286b39dd2fa0242d0344cfb47b0ec9ee94e83388a4dd7edde00f5d7
                                                          • Instruction Fuzzy Hash: CC41AD74640200EFEB20AF24C88AF2977A5AB49718F54C458FA1A9F393D67ADD41CB90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b8ba284ed1200281641c4abd155b239b76932701893ca4dd453563515fea1440
                                                          • Instruction ID: 004032caa0e4054632196ab684da7ab349d871ca4012cf67085c4f7a15d1d5fd
                                                          • Opcode Fuzzy Hash: b8ba284ed1200281641c4abd155b239b76932701893ca4dd453563515fea1440
                                                          • Instruction Fuzzy Hash: 6641F372A00344FFD7249F78CC45BAABBA9EBC9710F10462AF541DB283D779A9018780
                                                          APIs
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 007E5783
                                                          • GetLastError.KERNEL32(?,00000000), ref: 007E57A9
                                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 007E57CE
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 007E57FA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                                          • String ID:
                                                          • API String ID: 3321077145-0
                                                          • Opcode ID: 8c89c63cd8677fd1b15a3e9268ecd40cb65ed86114a9680c54209df90b8cc1d2
                                                          • Instruction ID: 06aad4a7ebc22b7403c07dc221c9c3919cb591fda24219af0d5bd0c05e5d64ed
                                                          • Opcode Fuzzy Hash: 8c89c63cd8677fd1b15a3e9268ecd40cb65ed86114a9680c54209df90b8cc1d2
                                                          • Instruction Fuzzy Hash: 81412D35600610DFCF15EF15C548A1DBBE2EF89764B19C888E84A5B362CB38FD10CB91
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000000,?,00796D71,00000000,00000000,007982D9,?,007982D9,?,00000001,00796D71,?,00000001,007982D9,007982D9), ref: 007AD910
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007AD999
                                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 007AD9AB
                                                          • __freea.LIBCMT ref: 007AD9B4
                                                            • Part of subcall function 007A3820: RtlAllocateHeap.NTDLL(00000000,?,00841444,?,0078FDF5,?,?,0077A976,00000010,00841440,007713FC,?,007713C6,?,00771129), ref: 007A3852
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                          • String ID:
                                                          • API String ID: 2652629310-0
                                                          • Opcode ID: ccc63b07caedfd14f8d93a708d21761d68fca9082db96511c9cbaa49fb4eb173
                                                          • Instruction ID: 094069c7324d0c97b1836addc182516edbdd92d0d7e89efd8a2bdadcc8163309
                                                          • Opcode Fuzzy Hash: ccc63b07caedfd14f8d93a708d21761d68fca9082db96511c9cbaa49fb4eb173
                                                          • Instruction Fuzzy Hash: 8331B072A0020AABDF249F65DC45EAF7BA5EF82310F054268FC05D7251EB39DD54CB90
                                                          APIs
                                                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 00805352
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00805375
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00805382
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008053A8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$InvalidateMessageRectSend
                                                          • String ID:
                                                          • API String ID: 3340791633-0
                                                          • Opcode ID: 6032470a2af5f4731f5fbfdb46d53f20d1e589130d25c0e28c27d33ed06e531c
                                                          • Instruction ID: 88fc7e7f65c766dd04f650854051f537c7fdc7b7440f265b69d1023cfba6cdf5
                                                          • Opcode Fuzzy Hash: 6032470a2af5f4731f5fbfdb46d53f20d1e589130d25c0e28c27d33ed06e531c
                                                          • Instruction Fuzzy Hash: BC31AE34A55A0CAEEBB09E14CC16BEA7B65FB06390F594101BA11D63E0C7B0A9809F62
                                                          APIs
                                                          • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 007DABF1
                                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 007DAC0D
                                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 007DAC74
                                                          • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 007DACC6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: a6d908a928c32568a211b971bdd93e425a07348affbe196f7a8092b7c57567ed
                                                          • Instruction ID: 149a8236a13ec009adfd3eabbf651ec72b66e0f599fcc26eaeb1dc5883b4e041
                                                          • Opcode Fuzzy Hash: a6d908a928c32568a211b971bdd93e425a07348affbe196f7a8092b7c57567ed
                                                          • Instruction Fuzzy Hash: 5F31F630A60618BFEB358B658C087FA7BB5BB85320F04431BE499523D1D37D99858772
                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 0080769A
                                                          • GetWindowRect.USER32(?,?), ref: 00807710
                                                          • PtInRect.USER32(?,?,00808B89), ref: 00807720
                                                          • MessageBeep.USER32(00000000), ref: 0080778C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Rect$BeepClientMessageScreenWindow
                                                          • String ID:
                                                          • API String ID: 1352109105-0
                                                          • Opcode ID: a83ce690b9d78005371035be3ba7be3419f2522e3b991bebda0ecedbeb98530b
                                                          • Instruction ID: 4cc1b0ee45f0a2e0d3d59e29a140700c46c7837fb4504553be91dd844000d11d
                                                          • Opcode Fuzzy Hash: a83ce690b9d78005371035be3ba7be3419f2522e3b991bebda0ecedbeb98530b
                                                          • Instruction Fuzzy Hash: E2418D38A052549FDB91CF58CC94EA9BBF4FF49344F1481A9E414DB2A1C371B981CB90
                                                          APIs
                                                          • GetForegroundWindow.USER32 ref: 008016EB
                                                            • Part of subcall function 007D3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 007D3A57
                                                            • Part of subcall function 007D3A3D: GetCurrentThreadId.KERNEL32 ref: 007D3A5E
                                                            • Part of subcall function 007D3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007D25B3), ref: 007D3A65
                                                          • GetCaretPos.USER32(?), ref: 008016FF
                                                          • ClientToScreen.USER32(00000000,?), ref: 0080174C
                                                          • GetForegroundWindow.USER32 ref: 00801752
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                          • String ID:
                                                          • API String ID: 2759813231-0
                                                          • Opcode ID: c7acee2708559ba9e82776faf72953a4b617b977718f8ff3e1fb042fff1953e6
                                                          • Instruction ID: 7eca73ef083414e2f1ff1c37baed5e155c8722cf5af3c84947dddb3c40e48584
                                                          • Opcode Fuzzy Hash: c7acee2708559ba9e82776faf72953a4b617b977718f8ff3e1fb042fff1953e6
                                                          • Instruction Fuzzy Hash: 77317275D00149EFCB04DFA9C885CAEB7F9FF49304B54806AE415E7251DB359E45CBA0
                                                          APIs
                                                            • Part of subcall function 00777620: _wcslen.LIBCMT ref: 00777625
                                                          • _wcslen.LIBCMT ref: 007DDFCB
                                                          • _wcslen.LIBCMT ref: 007DDFE2
                                                          • _wcslen.LIBCMT ref: 007DE00D
                                                          • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 007DE018
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$ExtentPoint32Text
                                                          • String ID:
                                                          • API String ID: 3763101759-0
                                                          • Opcode ID: 97482dc011a101e7eb939eb66d84de878b030ad3cce858e1b4979d6d17994776
                                                          • Instruction ID: 9a3cd19358fe63759a2aaba1e99da8def491a675f45c1d2d80be913015f16277
                                                          • Opcode Fuzzy Hash: 97482dc011a101e7eb939eb66d84de878b030ad3cce858e1b4979d6d17994776
                                                          • Instruction Fuzzy Hash: 9E21E571900614EFCB21EFA8D881BAEB7F8EF45760F144065E904FB341D6789E41CBA1
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 007DD501
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 007DD50F
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 007DD52F
                                                          • CloseHandle.KERNEL32(00000000), ref: 007DD5DC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                          • String ID:
                                                          • API String ID: 420147892-0
                                                          • Opcode ID: a223aa276fbb3523cfc56622b9aa0cd5c1cc2e0248c312fbd06b24ebe6d52664
                                                          • Instruction ID: 305e7a2840468ba73dddad30835ce826b4816ca6e7801e668a9ab46f5162c100
                                                          • Opcode Fuzzy Hash: a223aa276fbb3523cfc56622b9aa0cd5c1cc2e0248c312fbd06b24ebe6d52664
                                                          • Instruction Fuzzy Hash: D431C131108300DFD710EF64D885AAFBBF8EF99384F04452DF586822A1EB759945CBA2
                                                          APIs
                                                            • Part of subcall function 00789BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00789BB2
                                                          • GetCursorPos.USER32(?), ref: 00809001
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,007C7711,?,?,?,?,?), ref: 00809016
                                                          • GetCursorPos.USER32(?), ref: 0080905E
                                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,007C7711,?,?,?), ref: 00809094
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                          • String ID:
                                                          • API String ID: 2864067406-0
                                                          • Opcode ID: 2769794dffc53b3fafb71ca0b9dad6c739adfd92a065fda3434dd0bd37a2c7e1
                                                          • Instruction ID: 77ad3fe15bb6e10c9b94e369ec6d49fbccb3dd7268a975fb801e93349e12c642
                                                          • Opcode Fuzzy Hash: 2769794dffc53b3fafb71ca0b9dad6c739adfd92a065fda3434dd0bd37a2c7e1
                                                          • Instruction Fuzzy Hash: 4B218D35600418EFDB658F94CC58EFA7BF9FF8A350F044165F985872A2C3319990DB60
                                                          APIs
                                                          • GetFileAttributesW.KERNEL32(?,0080CB68), ref: 007DD2FB
                                                          • GetLastError.KERNEL32 ref: 007DD30A
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 007DD319
                                                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0080CB68), ref: 007DD376
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory$AttributesErrorFileLast
                                                          • String ID:
                                                          • API String ID: 2267087916-0
                                                          • Opcode ID: 377a41afe74972e02ec3ebf91708f01e4b7f8e6dfa8f53c7ffdd9f94986efc6f
                                                          • Instruction ID: 4c9185c486bc9c52889fabd2201e625d9032735ab9cea249a3020dc82799c64d
                                                          • Opcode Fuzzy Hash: 377a41afe74972e02ec3ebf91708f01e4b7f8e6dfa8f53c7ffdd9f94986efc6f
                                                          • Instruction Fuzzy Hash: 5F212C70509201DFC720DF28C88586AB7F4BE56764F504A1EF4A9C73A1E7399D45CB93
                                                          APIs
                                                            • Part of subcall function 007D1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 007D102A
                                                            • Part of subcall function 007D1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 007D1036
                                                            • Part of subcall function 007D1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007D1045
                                                            • Part of subcall function 007D1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 007D104C
                                                            • Part of subcall function 007D1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007D1062
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 007D15BE
                                                          • _memcmp.LIBVCRUNTIME ref: 007D15E1
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007D1617
                                                          • HeapFree.KERNEL32(00000000), ref: 007D161E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                          • String ID:
                                                          • API String ID: 1592001646-0
                                                          • Opcode ID: af79e0ec83e484cf302236d89175e2079c7f26813f053de79b636362d3b0fac4
                                                          • Instruction ID: f74a59c2a75f3e99eef4c9c6fd7a550fe410d24268c453be236412528e4a50f5
                                                          • Opcode Fuzzy Hash: af79e0ec83e484cf302236d89175e2079c7f26813f053de79b636362d3b0fac4
                                                          • Instruction Fuzzy Hash: 41218971E00109FFDF00DFA4C949BEEB7B8EF44344F49855AE441AB241EB38AA45CBA0
                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 0080280A
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00802824
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00802832
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00802840
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$AttributesLayered
                                                          • String ID:
                                                          • API String ID: 2169480361-0
                                                          • Opcode ID: 1790732d1881f2ea94fc85e72c455e0f276fc51781d44ab72f83e30364a62d3b
                                                          • Instruction ID: d098bae7fe97fc10a4d46230e2cf1c484fdb4d199514f498f2299dff3af00214
                                                          • Opcode Fuzzy Hash: 1790732d1881f2ea94fc85e72c455e0f276fc51781d44ab72f83e30364a62d3b
                                                          • Instruction Fuzzy Hash: E221A435204515AFD7549B24CC49F6A7795FF46328F148258F426CB6E2CBB5FC42C790
                                                          APIs
                                                            • Part of subcall function 007D8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,007D790A,?,000000FF,?,007D8754,00000000,?,0000001C,?,?), ref: 007D8D8C
                                                            • Part of subcall function 007D8D7D: lstrcpyW.KERNEL32(00000000,?,?,007D790A,?,000000FF,?,007D8754,00000000,?,0000001C,?,?,00000000), ref: 007D8DB2
                                                            • Part of subcall function 007D8D7D: lstrcmpiW.KERNEL32(00000000,?,007D790A,?,000000FF,?,007D8754,00000000,?,0000001C,?,?), ref: 007D8DE3
                                                          • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,007D8754,00000000,?,0000001C,?,?,00000000), ref: 007D7923
                                                          • lstrcpyW.KERNEL32(00000000,?,?,007D8754,00000000,?,0000001C,?,?,00000000), ref: 007D7949
                                                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,007D8754,00000000,?,0000001C,?,?,00000000), ref: 007D7984
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: lstrcmpilstrcpylstrlen
                                                          • String ID: cdecl
                                                          • API String ID: 4031866154-3896280584
                                                          • Opcode ID: 17c0db109e9a86e7a40341f7ceba349a0a9cd45ca7c83c3e9e831534d74b30e1
                                                          • Instruction ID: c526d68fcae3748820a94acd31f9c1cb5627b3c4cc183287077d2bd15352f552
                                                          • Opcode Fuzzy Hash: 17c0db109e9a86e7a40341f7ceba349a0a9cd45ca7c83c3e9e831534d74b30e1
                                                          • Instruction Fuzzy Hash: B011B43A200201ABCB195F34D855D7A77B9FF89350B50402BE946C73A4FB359811C7A1
                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00807D0B
                                                          • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00807D2A
                                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00807D42
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,007EB7AD,00000000), ref: 00807D6B
                                                            • Part of subcall function 00789BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00789BB2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID:
                                                          • API String ID: 847901565-0
                                                          • Opcode ID: 8b528419a8ee59db83a8b91a8425704ad36e4eba3a267cb833268c14413fb42a
                                                          • Instruction ID: 7ea2c8f818c746399b77b94d03c48b303d80beb5e8506e8fa7f7aca9bcbfa0b8
                                                          • Opcode Fuzzy Hash: 8b528419a8ee59db83a8b91a8425704ad36e4eba3a267cb833268c14413fb42a
                                                          • Instruction Fuzzy Hash: 1E11AF36A05619AFDB509F28CC08AA63BA5FF46360B254728FD39C72F0E731E950CB50
                                                          APIs
                                                          • SendMessageW.USER32(?,00001060,?,00000004), ref: 008056BB
                                                          • _wcslen.LIBCMT ref: 008056CD
                                                          • _wcslen.LIBCMT ref: 008056D8
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00805816
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend_wcslen
                                                          • String ID:
                                                          • API String ID: 455545452-0
                                                          • Opcode ID: 5a3a4c9c1b1822017b9a5c336ffbc0b683a1d743d56cf920af7e7b906536e722
                                                          • Instruction ID: cbe1da78947aeca8b17507c54ecd5e17db6e2d68545542376cbc92bbbb76b5b4
                                                          • Opcode Fuzzy Hash: 5a3a4c9c1b1822017b9a5c336ffbc0b683a1d743d56cf920af7e7b906536e722
                                                          • Instruction Fuzzy Hash: 5611E175A01A08A6DF609F61DC85AEF3BACFF10764B10402AF925E60C1EB709A81CF74
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6210792da8b5870a9b4d1af539a195fbf4f22b2fe077b37c1e766781764b0641
                                                          • Instruction ID: 5cef0db3b070700940b66f9be64bb7783ace7cdfd66e2072337b474a39dd3e68
                                                          • Opcode Fuzzy Hash: 6210792da8b5870a9b4d1af539a195fbf4f22b2fe077b37c1e766781764b0641
                                                          • Instruction Fuzzy Hash: 3C01ADB230961A7EF7612A786CC4F27661CEFC37B8F710329F521A11D2DB689C005A70
                                                          APIs
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 007D1A47
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007D1A59
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007D1A6F
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007D1A8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: bffcb0faafecd736b3630fead13ee3203fe57cee37e5b50c732feaf0abaddfb5
                                                          • Instruction ID: f699dc44a7cdf21d286b0c310b17682cfe1d8ba3f00003d146db5f1dccdf661e
                                                          • Opcode Fuzzy Hash: bffcb0faafecd736b3630fead13ee3203fe57cee37e5b50c732feaf0abaddfb5
                                                          • Instruction Fuzzy Hash: 4611393AD01219FFEB10DBA4CD85FADBB78FB08750F604092EA00B7290D6716E50DB94
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 007DE1FD
                                                          • MessageBoxW.USER32(?,?,?,?), ref: 007DE230
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 007DE246
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 007DE24D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                          • String ID:
                                                          • API String ID: 2880819207-0
                                                          • Opcode ID: 1465262b10ab14b7886b63a7b544581df0bd495d1637255afcea2882ca713f4a
                                                          • Instruction ID: 7deac11d109737275a885c6beb10187e1560008676be674260e06c55309b6e54
                                                          • Opcode Fuzzy Hash: 1465262b10ab14b7886b63a7b544581df0bd495d1637255afcea2882ca713f4a
                                                          • Instruction Fuzzy Hash: 9C11DB76904254BBCB02AFA89C09A9F7FBCBB45314F14435AF914D7391D778DD0487A0
                                                          APIs
                                                          • CreateThread.KERNEL32(00000000,?,0079CFF9,00000000,00000004,00000000), ref: 0079D218
                                                          • GetLastError.KERNEL32 ref: 0079D224
                                                          • __dosmaperr.LIBCMT ref: 0079D22B
                                                          • ResumeThread.KERNEL32(00000000), ref: 0079D249
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                          • String ID:
                                                          • API String ID: 173952441-0
                                                          • Opcode ID: bca4a690b8012df784ddbfc0d49a897d9dda7919e0d874b4ec21e62e2a7313e7
                                                          • Instruction ID: 3bbf8b79b413ee3e9aeaa91c7b6248db616108afe2d77890f0bed574df1b7ab1
                                                          • Opcode Fuzzy Hash: bca4a690b8012df784ddbfc0d49a897d9dda7919e0d874b4ec21e62e2a7313e7
                                                          • Instruction Fuzzy Hash: 8201D236805208BBDF215FA9EC0ABAE7A69FF81730F210319F925921D0DB78CD01C6A0
                                                          APIs
                                                            • Part of subcall function 00789BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00789BB2
                                                          • GetClientRect.USER32(?,?), ref: 00809F31
                                                          • GetCursorPos.USER32(?), ref: 00809F3B
                                                          • ScreenToClient.USER32(?,?), ref: 00809F46
                                                          • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00809F7A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Client$CursorLongProcRectScreenWindow
                                                          • String ID:
                                                          • API String ID: 4127811313-0
                                                          • Opcode ID: 2ed8634178a7a647a26d61dd8913d5d5cb546f6c0a3cfb08d3823f165853e084
                                                          • Instruction ID: 574c0cbacd6a091f67c621ba783ff2e579fdf87b3cbaade13f5986c0db10a7f6
                                                          • Opcode Fuzzy Hash: 2ed8634178a7a647a26d61dd8913d5d5cb546f6c0a3cfb08d3823f165853e084
                                                          • Instruction Fuzzy Hash: 62114836A0011AABDB50EFA8DC899EE7BB8FB05311F000555F951E3191DB30BA81CBA1
                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0077604C
                                                          • GetStockObject.GDI32(00000011), ref: 00776060
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 0077606A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateMessageObjectSendStockWindow
                                                          • String ID:
                                                          • API String ID: 3970641297-0
                                                          • Opcode ID: f34d8e88813b17180b736e873a6663dd5e4f2bc85e1fd0df1e31e72c121bcf0f
                                                          • Instruction ID: 0248df80b020764f7725ee21478ba36a0c4eac54f6c6c1875f2f1324fdddc2f9
                                                          • Opcode Fuzzy Hash: f34d8e88813b17180b736e873a6663dd5e4f2bc85e1fd0df1e31e72c121bcf0f
                                                          • Instruction Fuzzy Hash: 52118B72101908BFEF524FA48C44EEABBA9FF083A4F004215FA1852010D7369C60DBA0
                                                          APIs
                                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 00793B56
                                                            • Part of subcall function 00793AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00793AD2
                                                            • Part of subcall function 00793AA3: ___AdjustPointer.LIBCMT ref: 00793AED
                                                          • _UnwindNestedFrames.LIBCMT ref: 00793B6B
                                                          • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00793B7C
                                                          • CallCatchBlock.LIBVCRUNTIME ref: 00793BA4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                          • String ID:
                                                          • API String ID: 737400349-0
                                                          • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                          • Instruction ID: 383071d3fcc70673cc667c72a1e9584731eeb3431f07ad48e9f5b0ddc1349cbc
                                                          • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                          • Instruction Fuzzy Hash: C9012972100148BBDF126E95EC46EEB3B7AFF48754F044014FE4896121C73AE962EBA0
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,007713C6,00000000,00000000,?,007A301A,007713C6,00000000,00000000,00000000,?,007A328B,00000006,FlsSetValue), ref: 007A30A5
                                                          • GetLastError.KERNEL32(?,007A301A,007713C6,00000000,00000000,00000000,?,007A328B,00000006,FlsSetValue,00812290,FlsSetValue,00000000,00000364,?,007A2E46), ref: 007A30B1
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,007A301A,007713C6,00000000,00000000,00000000,?,007A328B,00000006,FlsSetValue,00812290,FlsSetValue,00000000), ref: 007A30BF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: LibraryLoad$ErrorLast
                                                          • String ID:
                                                          • API String ID: 3177248105-0
                                                          • Opcode ID: 902c6b4ab9e1e4fdfbe25047f7e58b1e81746282da49781fac2231fde6f9db04
                                                          • Instruction ID: a3de40865cfd80ea95e89d87575cf0f6419fa26452626a2f09c8b117ea2237e5
                                                          • Opcode Fuzzy Hash: 902c6b4ab9e1e4fdfbe25047f7e58b1e81746282da49781fac2231fde6f9db04
                                                          • Instruction Fuzzy Hash: E1012B32312226EBCB314F799C489577B9ABF87BA1B210720F905E3180D725D901C6E0
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 007D747F
                                                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 007D7497
                                                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 007D74AC
                                                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 007D74CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Type$Register$FileLoadModuleNameUser
                                                          • String ID:
                                                          • API String ID: 1352324309-0
                                                          • Opcode ID: 8e4208c2f9598f6993662d9f4b5e90b899917745b0374a5dbf58c5647fd83551
                                                          • Instruction ID: 23412410464edd4d9eb99374a9c72e305a20fe77339e13f6bb3dee733a5984c1
                                                          • Opcode Fuzzy Hash: 8e4208c2f9598f6993662d9f4b5e90b899917745b0374a5dbf58c5647fd83551
                                                          • Instruction Fuzzy Hash: F811C0B1205750AFE7218F14DC09F92BFFCFB00B10F10856AA616D6291E7B4E904DBA0
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,007DACD3,?,00008000), ref: 007DB0C4
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,007DACD3,?,00008000), ref: 007DB0E9
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,007DACD3,?,00008000), ref: 007DB0F3
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,007DACD3,?,00008000), ref: 007DB126
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CounterPerformanceQuerySleep
                                                          • String ID:
                                                          • API String ID: 2875609808-0
                                                          • Opcode ID: e7c8fc3d6696a5cd7b4cdc494ce4300c07e928b837555a880e54ac106919d8b4
                                                          • Instruction ID: c65266b20c10ae5227cde947923553f2cb2d064039fad454f61b4783133a4f32
                                                          • Opcode Fuzzy Hash: e7c8fc3d6696a5cd7b4cdc494ce4300c07e928b837555a880e54ac106919d8b4
                                                          • Instruction Fuzzy Hash: BB118031D0162CE7CF00AFE4E9596EEBF78FF49711F124186D941B2281CB389650CB95
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00807E33
                                                          • ScreenToClient.USER32(?,?), ref: 00807E4B
                                                          • ScreenToClient.USER32(?,?), ref: 00807E6F
                                                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00807E8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ClientRectScreen$InvalidateWindow
                                                          • String ID:
                                                          • API String ID: 357397906-0
                                                          • Opcode ID: 0dbc6fc0bd4d690d583435497b4132498939a89fded29eddcaa7aa9408236b29
                                                          • Instruction ID: 040e846bba67442f3fc40018eaf43de4cd0cf2234c372cd1ab802539dae5b199
                                                          • Opcode Fuzzy Hash: 0dbc6fc0bd4d690d583435497b4132498939a89fded29eddcaa7aa9408236b29
                                                          • Instruction Fuzzy Hash: F81186B9D0020AAFDB41CF98C8849EEBBF5FF08310F104156E911E3250D735AA54CF50
                                                          APIs
                                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 007D2DC5
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 007D2DD6
                                                          • GetCurrentThreadId.KERNEL32 ref: 007D2DDD
                                                          • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 007D2DE4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 2710830443-0
                                                          • Opcode ID: 1398047e3f02cc5de1ddd3b7621d4c67b542f2b6eead57455dda02c7e61a00c4
                                                          • Instruction ID: 51d9d4214ed33a003631198750aa795121a672fa5f11d37450ac3b378c0b111c
                                                          • Opcode Fuzzy Hash: 1398047e3f02cc5de1ddd3b7621d4c67b542f2b6eead57455dda02c7e61a00c4
                                                          • Instruction Fuzzy Hash: 78E06DB12012247AD7201B629C0DEEB3E6DFF66BA1F04021AB106D11919AA58842C6B0
                                                          APIs
                                                            • Part of subcall function 00789639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00789693
                                                            • Part of subcall function 00789639: SelectObject.GDI32(?,00000000), ref: 007896A2
                                                            • Part of subcall function 00789639: BeginPath.GDI32(?), ref: 007896B9
                                                            • Part of subcall function 00789639: SelectObject.GDI32(?,00000000), ref: 007896E2
                                                          • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00808887
                                                          • LineTo.GDI32(?,?,?), ref: 00808894
                                                          • EndPath.GDI32(?), ref: 008088A4
                                                          • StrokePath.GDI32(?), ref: 008088B2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                          • String ID:
                                                          • API String ID: 1539411459-0
                                                          • Opcode ID: 0055dd72edc52dcc40af6711a3811359a1dabf0da2651ba81a15861d03c27d34
                                                          • Instruction ID: 47d2de15ce7471260a298f89b188d4d27175e3c9fdc110e576433d91a8f32307
                                                          • Opcode Fuzzy Hash: 0055dd72edc52dcc40af6711a3811359a1dabf0da2651ba81a15861d03c27d34
                                                          • Instruction Fuzzy Hash: 73F03A36041658FAEB526F94AC0DFCA3E59BF06310F448100FA11650E1C7755551DBE5
                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 007898CC
                                                          • SetTextColor.GDI32(?,?), ref: 007898D6
                                                          • SetBkMode.GDI32(?,00000001), ref: 007898E9
                                                          • GetStockObject.GDI32(00000005), ref: 007898F1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$ModeObjectStockText
                                                          • String ID:
                                                          • API String ID: 4037423528-0
                                                          • Opcode ID: ef81faa0006920580f5178e2987dcffc84ca86c936440e391a21feb6ebfcd4dc
                                                          • Instruction ID: f5b10391d63bbfb99c21d0b4068fc60d7b943f66ea24b73dfaad8282ffee4990
                                                          • Opcode Fuzzy Hash: ef81faa0006920580f5178e2987dcffc84ca86c936440e391a21feb6ebfcd4dc
                                                          • Instruction Fuzzy Hash: F3E03931284280AEDB615F74AC09BE83B20BB12336F048319FABA580E1C77586509B10
                                                          APIs
                                                          • GetCurrentThread.KERNEL32 ref: 007D1634
                                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,007D11D9), ref: 007D163B
                                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,007D11D9), ref: 007D1648
                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,007D11D9), ref: 007D164F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentOpenProcessThreadToken
                                                          • String ID:
                                                          • API String ID: 3974789173-0
                                                          • Opcode ID: f8386d9fa90ff20a6be7216c47664422d8d3731e5f1c16e54746b726f2a44a0a
                                                          • Instruction ID: aacd97fcf5e26aac645f2f663d65bc0890f8e48667e1eb9be5e498bc509de6d2
                                                          • Opcode Fuzzy Hash: f8386d9fa90ff20a6be7216c47664422d8d3731e5f1c16e54746b726f2a44a0a
                                                          • Instruction Fuzzy Hash: F4E08C32602211EBE7A01FA1AE0EB863B7CBF44792F148909F245C9090EA388440CB60
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 007CD858
                                                          • GetDC.USER32(00000000), ref: 007CD862
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007CD882
                                                          • ReleaseDC.USER32(?), ref: 007CD8A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 080563d57fded2f246d5f61d6b6d66e4396fee68d5a1daa5af75a605e126cf8d
                                                          • Instruction ID: 8b009cba28993463e46b6d6a55298c1be636e08ce2bcbfbebde5ff193c77ee90
                                                          • Opcode Fuzzy Hash: 080563d57fded2f246d5f61d6b6d66e4396fee68d5a1daa5af75a605e126cf8d
                                                          • Instruction Fuzzy Hash: C1E01AB1800204DFCFA1AFA0D80CA6DBBB1FB18310F14811DF856E7250CB398941AF50
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 007CD86C
                                                          • GetDC.USER32(00000000), ref: 007CD876
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007CD882
                                                          • ReleaseDC.USER32(?), ref: 007CD8A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: f5e9466d73020aae2f6b141506d0c9297b4e8c4d84dd585580bf9d9e69b6a856
                                                          • Instruction ID: 9ba44e664bcb2e2a6f09ffeb85be6d951c295636ba764b4e94992540813502d2
                                                          • Opcode Fuzzy Hash: f5e9466d73020aae2f6b141506d0c9297b4e8c4d84dd585580bf9d9e69b6a856
                                                          • Instruction Fuzzy Hash: E9E092B5800204EFCFA1AFA0D80D66DBBB5BB18311F149549E95AE7290DB395901AF50
                                                          APIs
                                                            • Part of subcall function 00777620: _wcslen.LIBCMT ref: 00777625
                                                          • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 007E4ED4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Connection_wcslen
                                                          • String ID: *$LPT
                                                          • API String ID: 1725874428-3443410124
                                                          • Opcode ID: 6e73980a85bfea8cc4b80b42e5addf2f6a8805234335b9f8b9398f94cdf9c85c
                                                          • Instruction ID: f675f3aa1328dc75a278161a12f963d4ad639927757f7332d8c8bd1030dca1ca
                                                          • Opcode Fuzzy Hash: 6e73980a85bfea8cc4b80b42e5addf2f6a8805234335b9f8b9398f94cdf9c85c
                                                          • Instruction Fuzzy Hash: 51917275A01244DFCB14DF59C484EAABBF1BF48704F198099E80A9F362D739ED85CB91
                                                          APIs
                                                          • __startOneArgErrorHandling.LIBCMT ref: 0079E30D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorHandling__start
                                                          • String ID: pow
                                                          • API String ID: 3213639722-2276729525
                                                          • Opcode ID: 81b2b00e1d5ad39cdc6e34f07e1592458df3d510beae3b37a9d64c918b735709
                                                          • Instruction ID: ff58a0e11264b6ff1bc9e55087c8c01a2a03aa5540d167971e18ac335597196b
                                                          • Opcode Fuzzy Hash: 81b2b00e1d5ad39cdc6e34f07e1592458df3d510beae3b37a9d64c918b735709
                                                          • Instruction Fuzzy Hash: D3513B61A0D20296CF19B714ED453B93BA8FF81741F348E68F0D5422A9EF3D8C91DA46
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: #
                                                          • API String ID: 0-1885708031
                                                          • Opcode ID: fb210a7ed5ef153b6b531eac63a4a1e3a634e1689189d3035951e9fdaea60170
                                                          • Instruction ID: b9595e822b2b7366c02da1ebfb42c51cf8b7af19886acbaf9e7b2d0a12e9157b
                                                          • Opcode Fuzzy Hash: fb210a7ed5ef153b6b531eac63a4a1e3a634e1689189d3035951e9fdaea60170
                                                          • Instruction Fuzzy Hash: 3D51F075904246DFDF25EF68C485ABA7BA8FF25310F24805DE8919B290DB3C9D42CBA0
                                                          APIs
                                                          • Sleep.KERNEL32(00000000), ref: 0078F2A2
                                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 0078F2BB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemorySleepStatus
                                                          • String ID: @
                                                          • API String ID: 2783356886-2766056989
                                                          • Opcode ID: a29dbaa1cd85e2da58b9265bbd44a76688e0eb9275f737b479bf09f38d9273f8
                                                          • Instruction ID: 937692c531b29f070d7835edec8fe0869fe5482c99c3302a7ead33c0d30e08e2
                                                          • Opcode Fuzzy Hash: a29dbaa1cd85e2da58b9265bbd44a76688e0eb9275f737b479bf09f38d9273f8
                                                          • Instruction Fuzzy Hash: 59514672418744DBD720AF20DC8ABAFBBF8FB95340F81885DF1D9411A5EB348529CB66
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 007F57E0
                                                          • _wcslen.LIBCMT ref: 007F57EC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper_wcslen
                                                          • String ID: CALLARGARRAY
                                                          • API String ID: 157775604-1150593374
                                                          • Opcode ID: aac44c8fead00879e46eec11b6ca105519e2e8ef71c292980cc8f8744e291b84
                                                          • Instruction ID: 6f25f9d434c0a0b8da3fa77633c3de4f49d5f7c4b87d357e387073603120b876
                                                          • Opcode Fuzzy Hash: aac44c8fead00879e46eec11b6ca105519e2e8ef71c292980cc8f8744e291b84
                                                          • Instruction Fuzzy Hash: 7541A131A00209DFCF14EFA9C8868BEBBB5FF59360F104169E605A7391E7389D81CB90
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 007ED130
                                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 007ED13A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CrackInternet_wcslen
                                                          • String ID: |
                                                          • API String ID: 596671847-2343686810
                                                          • Opcode ID: 3784cb88800ef61589adfa9d8fd5cd544fb28c07fb236916acb088c0c99cd229
                                                          • Instruction ID: 01385c66f79635dcecaac5b42c06df5e9132ec08fd36b3d69acc41e068b710e3
                                                          • Opcode Fuzzy Hash: 3784cb88800ef61589adfa9d8fd5cd544fb28c07fb236916acb088c0c99cd229
                                                          • Instruction Fuzzy Hash: 54312D71D01209EBCF15EFA5CC89AEE7FB9FF08340F004019F919A6165E775A916CB61
                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?,?), ref: 00803621
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0080365C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$DestroyMove
                                                          • String ID: static
                                                          • API String ID: 2139405536-2160076837
                                                          • Opcode ID: afbcb02fc5b28378e768cfc0898fe16a9ec67aead55fa2ade2daa8cda2741d1f
                                                          • Instruction ID: 369dd3f6866f49af6a593a568a99bcca856ee98ea16e5bc642d4683e66f58cb2
                                                          • Opcode Fuzzy Hash: afbcb02fc5b28378e768cfc0898fe16a9ec67aead55fa2ade2daa8cda2741d1f
                                                          • Instruction Fuzzy Hash: F331AB71100608AAEB609F28DC81EBB73ADFF98720F109619F8A5D7290DB35AD81D760
                                                          APIs
                                                          • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 0080461F
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00804634
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: '
                                                          • API String ID: 3850602802-1997036262
                                                          • Opcode ID: abe53eddfca44fb03342d9d3d5a5595afcd7cdc619393b44e2ae49e2d3b0a5db
                                                          • Instruction ID: 9db506ca04222c56296e73eb82a6b52940ad1e067dc08c937cb62d12f9ed5db0
                                                          • Opcode Fuzzy Hash: abe53eddfca44fb03342d9d3d5a5595afcd7cdc619393b44e2ae49e2d3b0a5db
                                                          • Instruction Fuzzy Hash: E0314AB5A4120A9FEF54CFA9C980BDA7BB5FF49300F105069EA14EB381E771A941CF90
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0080327C
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00803287
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: Combobox
                                                          • API String ID: 3850602802-2096851135
                                                          • Opcode ID: a32f78ab1b61e580e2d9a522cee080a50ffd5ba75b563c4e07c61101474a63ab
                                                          • Instruction ID: a882a58fbbdc81c5b26d849ec035d567a625e05f762654d37d6868d049180607
                                                          • Opcode Fuzzy Hash: a32f78ab1b61e580e2d9a522cee080a50ffd5ba75b563c4e07c61101474a63ab
                                                          • Instruction Fuzzy Hash: D9118E71200208AFEFA19E54DC85EAB376EFB943A5F104129F928D72D0D6319D518760
                                                          APIs
                                                            • Part of subcall function 0077600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0077604C
                                                            • Part of subcall function 0077600E: GetStockObject.GDI32(00000011), ref: 00776060
                                                            • Part of subcall function 0077600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0077606A
                                                          • GetWindowRect.USER32(00000000,?), ref: 0080377A
                                                          • GetSysColor.USER32(00000012), ref: 00803794
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                          • String ID: static
                                                          • API String ID: 1983116058-2160076837
                                                          • Opcode ID: c727d15430dacb6cf5adef2cbb7aaaa80446e40316cade932190d81c751efc88
                                                          • Instruction ID: 58e6350d12b6d1464b506f8ebcdf70dd2df02d010d161f73a145701afa4e90bd
                                                          • Opcode Fuzzy Hash: c727d15430dacb6cf5adef2cbb7aaaa80446e40316cade932190d81c751efc88
                                                          • Instruction Fuzzy Hash: A31129B2610209AFDF50DFA8CC45EFA7BB8FB08354F004A25F955E2290E735E851DB50
                                                          APIs
                                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 007ECD7D
                                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 007ECDA6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$OpenOption
                                                          • String ID: <local>
                                                          • API String ID: 942729171-4266983199
                                                          • Opcode ID: da96a56702c037ab4bf5fe84e2fafd6fa7bae13b832c0b253471e4c88d3f2ffe
                                                          • Instruction ID: a4e46c32f1aa4a16b3839e9d23d2b6c63df38eba2c8ab353ae3fb634e445e273
                                                          • Opcode Fuzzy Hash: da96a56702c037ab4bf5fe84e2fafd6fa7bae13b832c0b253471e4c88d3f2ffe
                                                          • Instruction Fuzzy Hash: FD11C679306671BAD7758B678C45EE7BEACEF167A4F004226B10983180D7799842D6F0
                                                          APIs
                                                          • GetWindowTextLengthW.USER32(00000000), ref: 008034AB
                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 008034BA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: LengthMessageSendTextWindow
                                                          • String ID: edit
                                                          • API String ID: 2978978980-2167791130
                                                          • Opcode ID: 5e546a4ffa50fd3e7faf06c50dbab3d0772ecd0297d039afcb46979364443f60
                                                          • Instruction ID: 50b9080ef1e40375910d34f0ed4d047fa8f5461ce23148d7bb55052ae65bc633
                                                          • Opcode Fuzzy Hash: 5e546a4ffa50fd3e7faf06c50dbab3d0772ecd0297d039afcb46979364443f60
                                                          • Instruction Fuzzy Hash: 47119D71100508AAEB914F64DC44AAA376EFB25378F504324F960DB1E0C771DD919758
                                                          APIs
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                          • CharUpperBuffW.USER32(?,?,?), ref: 007D6CB6
                                                          • _wcslen.LIBCMT ref: 007D6CC2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: STOP
                                                          • API String ID: 1256254125-2411985666
                                                          • Opcode ID: 355be675ca26fe8b17a0def58e46884034b3166ac5e0710d206b7c471c6e1fdc
                                                          • Instruction ID: 3d1db5ed0d6494b46c0fead108c20addb26eb5ec73163ff982e182c0e5b2136e
                                                          • Opcode Fuzzy Hash: 355be675ca26fe8b17a0def58e46884034b3166ac5e0710d206b7c471c6e1fdc
                                                          • Instruction Fuzzy Hash: AF0104326105268ACF20AFBDDC858BF73B5FB61750700052AE86692291EA39E800C660
                                                          APIs
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                            • Part of subcall function 007D3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007D3CCA
                                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 007D1D4C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 97268965c6c8feb0fd3bf20ae25eb1e33fdabd31de5060eb2bdd6bd7aa327d6c
                                                          • Instruction ID: ad404057d2978835f680a02d715a7da0f3904f13b2e425a251696704437e79a1
                                                          • Opcode Fuzzy Hash: 97268965c6c8feb0fd3bf20ae25eb1e33fdabd31de5060eb2bdd6bd7aa327d6c
                                                          • Instruction Fuzzy Hash: 5B01B571711218ABCF14EBA4CD55CFEB379FB56390B440A1AE836673C1EB3959088671
                                                          APIs
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                            • Part of subcall function 007D3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007D3CCA
                                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 007D1C46
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 9331ffb5eed01e0b69bd252925e39f96db6f67104af652d844f78375657c128c
                                                          • Instruction ID: 389e5aaf2b61daf3e3fbc597810c7394418ea2ca395eaf6ece0989532b6e5f29
                                                          • Opcode Fuzzy Hash: 9331ffb5eed01e0b69bd252925e39f96db6f67104af652d844f78375657c128c
                                                          • Instruction Fuzzy Hash: E701A775791104B6DF14EBA0CE56DFFB7B89B52380F54001AA51E773C2EA289E0886B2
                                                          APIs
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                            • Part of subcall function 007D3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007D3CCA
                                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 007D1CC8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: c2bff91e323ed69cd91931ada67bd6b989094afedc8f2b68c2b6ea3b96aa9163
                                                          • Instruction ID: 0cb0c791f62759e021fa544fb8544bc7a76cf68b6b2a8c794cf2cfb4046166b0
                                                          • Opcode Fuzzy Hash: c2bff91e323ed69cd91931ada67bd6b989094afedc8f2b68c2b6ea3b96aa9163
                                                          • Instruction Fuzzy Hash: AC01A771751114B6CF14EBA0CA06EFEB3B8AB11380F540016B91973381EA299F08C672
                                                          APIs
                                                            • Part of subcall function 00779CB3: _wcslen.LIBCMT ref: 00779CBD
                                                            • Part of subcall function 007D3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007D3CCA
                                                          • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 007D1DD3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: eb7f64afb40fedd5e3d7bc2e525f1334f36d972d7743b98ab158eff6ba444d62
                                                          • Instruction ID: 4b1a29a819100f8550664655791c351bdc349a029aa55e6a4e1d367209117628
                                                          • Opcode Fuzzy Hash: eb7f64afb40fedd5e3d7bc2e525f1334f36d972d7743b98ab158eff6ba444d62
                                                          • Instruction Fuzzy Hash: D4F0F471B52214B6CF04E7A4CD56EFEB378AB12390F44091AB936A33C1DB68590882B1
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: 3, 3, 16, 1
                                                          • API String ID: 176396367-3042988571
                                                          • Opcode ID: a6f7f2e4f0788bdd74af2540e5965a9cc982e0e71317a3e8d5989bf7760d9b87
                                                          • Instruction ID: cf653e205d23cc930a38400a9a5382069feeace3c1bc8daf9442b983058cf3e3
                                                          • Opcode Fuzzy Hash: a6f7f2e4f0788bdd74af2540e5965a9cc982e0e71317a3e8d5989bf7760d9b87
                                                          • Instruction Fuzzy Hash: 9BE02B52204664609235227DACC5D7F5689DFC9760710182BFA81C2366EA9CDD92D3A0
                                                          APIs
                                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 007D0B23
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Message
                                                          • String ID: AutoIt$Error allocating memory.
                                                          • API String ID: 2030045667-4017498283
                                                          • Opcode ID: cd0afbd27a1818ee94899db5bf4cc7a3a4cd127fef202ad594a7b6c73be081d4
                                                          • Instruction ID: 123e13791d114269a8eea5717b36dc78a6e81a86bac9bfa33ace32071d2306ec
                                                          • Opcode Fuzzy Hash: cd0afbd27a1818ee94899db5bf4cc7a3a4cd127fef202ad594a7b6c73be081d4
                                                          • Instruction Fuzzy Hash: 5BE0D831284308A6D6143B947C0BF897B84DF05B61F100427FB58956C38AE9249006E9
                                                          APIs
                                                            • Part of subcall function 0078F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00790D71,?,?,?,0077100A), ref: 0078F7CE
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,0077100A), ref: 00790D75
                                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0077100A), ref: 00790D84
                                                          Strings
                                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00790D7F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                          • API String ID: 55579361-631824599
                                                          • Opcode ID: f8ac2c2bf096774bdf573a0b76f991a37fc801e47168bf9cf7600dd0a385d76f
                                                          • Instruction ID: c8c6ab4ecafa1072893424ecaf2608abaef755f4d3bccac7662d27370e8b7c3c
                                                          • Opcode Fuzzy Hash: f8ac2c2bf096774bdf573a0b76f991a37fc801e47168bf9cf7600dd0a385d76f
                                                          • Instruction Fuzzy Hash: 1DE0ED742007518FEBB09FB8E8487467BE4BB14754F008A2DE996C6A92DBB9E444CBD1
                                                          APIs
                                                          • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 007E302F
                                                          • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 007E3044
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: Temp$FileNamePath
                                                          • String ID: aut
                                                          • API String ID: 3285503233-3010740371
                                                          • Opcode ID: 38effe4cbfe31e0a0f0e5116dd64f4d8d6e752dfed69f465688474c40a9c1c89
                                                          • Instruction ID: c0c34aab24ee5e003bd141fd2c06e20fc28f34c5ebf3d2dba5648e57dc8d2c7d
                                                          • Opcode Fuzzy Hash: 38effe4cbfe31e0a0f0e5116dd64f4d8d6e752dfed69f465688474c40a9c1c89
                                                          • Instruction Fuzzy Hash: 92D05E7250032877DA60ABA8AC0EFCB3B6CEB05750F0002A1B655E20D1EAB49984CAD0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: LocalTime
                                                          • String ID: %.3d$X64
                                                          • API String ID: 481472006-1077770165
                                                          • Opcode ID: 13c5a909eae121d8a245ef754aa562430a3dd5854f77032c01eeb7ee3f44a092
                                                          • Instruction ID: 7ad0493857eb2b7378e96584b621496b5839d9b4c623cc14f63c64c7374a377b
                                                          • Opcode Fuzzy Hash: 13c5a909eae121d8a245ef754aa562430a3dd5854f77032c01eeb7ee3f44a092
                                                          • Instruction Fuzzy Hash: B8D012A1C48108E9CBB0A7E0CC49EBAB3BCFB09301F50847EF806D2040D63CCD486B61
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0080232C
                                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0080233F
                                                            • Part of subcall function 007DE97B: Sleep.KERNEL32 ref: 007DE9F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 8ffe0966762128bbcea2dcaf1b6e06b2758681732ebbbe7d24c78e1ba2e6046c
                                                          • Instruction ID: de3898598dd4fad9ec3133546fb9dc177223bd54a239f5a0eabd5aa1af535324
                                                          • Opcode Fuzzy Hash: 8ffe0966762128bbcea2dcaf1b6e06b2758681732ebbbe7d24c78e1ba2e6046c
                                                          • Instruction Fuzzy Hash: FFD0C976395310B6E6E8BB709C1FFC66A18BB50B14F108A167655AA2D0D9A4A8018A94
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0080236C
                                                          • PostMessageW.USER32(00000000), ref: 00802373
                                                            • Part of subcall function 007DE97B: Sleep.KERNEL32 ref: 007DE9F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: a9d7dee7963ff627b3f1c917933251882e52772baf18ed0fb0743cf039ed07a8
                                                          • Instruction ID: 5db35058612691e908305e3e9cc3af431ebffef696b2edf29fd67eb6bcb6aaaf
                                                          • Opcode Fuzzy Hash: a9d7dee7963ff627b3f1c917933251882e52772baf18ed0fb0743cf039ed07a8
                                                          • Instruction Fuzzy Hash: 2CD0C976382310BAE6E8BB709C0FFC66618BB55B14F508A167655EA2D0D9A4B8018A94
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 007ABE93
                                                          • GetLastError.KERNEL32 ref: 007ABEA1
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007ABEFC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1698693892.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                                          • Associated: 00000000.00000002.1698679748.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698782784.0000000000832000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698828424.000000000083C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1698847958.0000000000844000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_770000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorLast
                                                          • String ID:
                                                          • API String ID: 1717984340-0
                                                          • Opcode ID: 4e0f6b39c467c80c7aa5e77a63a0ce04e75892540421b84354a99f4768ef7373
                                                          • Instruction ID: db7c9c21422e587115a4439a61c6542057a954b8f106404c9aeefaf1a33f686e
                                                          • Opcode Fuzzy Hash: 4e0f6b39c467c80c7aa5e77a63a0ce04e75892540421b84354a99f4768ef7373
                                                          • Instruction Fuzzy Hash: C7412935605246EFCF218FA4DC94ABA7BA4EF83310F184369F959971A3DB348D00CB50